Analysis
-
max time kernel
210s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2023 00:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.ly/s3WFc
Resource
win10v2004-20231127-en
General
-
Target
https://t.ly/s3WFc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 5084 chrome.exe 5084 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5084 wrote to memory of 4416 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4416 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 1692 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 3896 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 3896 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe PID 5084 wrote to memory of 4196 5084 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.ly/s3WFc1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7b189758,0x7ffe7b189768,0x7ffe7b1897782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3728 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 --field-trial-handle=1880,i,16529316478637615511,6325580587946713187,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD5ee13ea2adba8849b3865b97086bf9e54
SHA109e346703d12e9283fa66bfcc626c1d0633afe29
SHA256cca85ba0eb4e4372db1d0576e074d5f1840610f3388917ca55404c55a2b391f1
SHA512775ee746651317bcfff4155cd81848a877aef61204f5f6fc836779e99513683d7ef2b4bbaaac44231f752842561f62c160b42f0f9cb9dec72b28d1e01bff740e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5f09cbd6674deb1f5a52a43d17170ee4b
SHA1535e9cef6fda82c58bf969f9e18b27ef1c749839
SHA256a1f42b9d045b2526bca5eb483284f5416948b9c34663c6a1bd8d60027e6c8edb
SHA512c19c5c34d0ed442e24d26755a56dfba10704cc8f8bf84b09a6829b7e2ff3de109418ffeedfe329f7727d8866ddc095ffb88fa0d98c60144466e37aa1ff38430b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5e92a788ba0ebb2822f9c5f43ab134164
SHA1ef8b9648b21c69fd53cb59b32bfa0be93eebaf02
SHA256ee02dc856fdee526b3c034916b28c6f63401962d6d65bcf22c97f7524b909432
SHA5123183e969760b0ef21b04d60e3fab0c692417de0b00803e71a794fe1273941ba41318be2ffdf4894731ea0f0b32813b172544809d9a721f9ef1e8b067552fb6fd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5f2220607f1a562122689a9c3a349a476
SHA1a98e03be62203b2c27a898a70bf74c65e64ccb75
SHA2564e9eb638c009e52a5ef3a4293c20fd2a956081635d6dcd2fdbbb797a03a7040f
SHA51299e24ca9f282a1a2ed07dcb2508b836cc13001cb86ad790e8af1ce9f1e7fff4a0840dfaf14d57d7a3faf5445a5f93702fbaa6397fab60ce21bad7d2b506d0361
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5a55e43660ae9f46de9e5c07ea5489677
SHA1456d10237033fa7d0a6ac494f095376d9ca385cf
SHA25661128375b94f4572141086149d5677267d68b888cce18e8c85510e722da9385e
SHA512715ae0bbc4667bd25e82e84b8a7fef157391ab6ad07e381410a7e0b79a9d8e45a728184b310dc634285f2b4a641bcc6e7d00bbc565f5e3dc848899230779dc72
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD54e9b05f6dd3800ce4a5780b924d7802a
SHA1a400d695d20d24448b2e73a57453048901df37e6
SHA256e1ddf51f188c03340dd24607128dd111e0076880d225ba90567abb6ddf76b6a6
SHA512167dd5699dd265eeb1daf87b48aba59a209b9e5ea8bef0bd37acde4a9a0114c8c91548b547066c0f39ba606692a50c458285fcb41d2fdade7ad1770d31b96997
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD51852f5592fa6b7259a06e9e8ac246d0f
SHA15e0db44882bc7b731c6f748118e28f4ed96f90f0
SHA2569a063a812ac1020fd20c0be2fb60211780a9147b3c624dce54c82f7052da7dd8
SHA5124534439655f8f9db7b8ad25c7353cf4da0a59f054fd20a5e2f4f8b14dc1288199cc88546a9912f295f0265b5703e764fdaf1c06fa98345292e012da602f21ceb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
115KB
MD567dc8ba528ecf4540eb0c9add74523a5
SHA107eb7389f23b6de095dd2deb7e00062dc65317b3
SHA256ec6a0f0e2490da40385ea2058dc0bb9d964ef8f41902fc01552253d224f04e70
SHA51263fa8a720ec537f35a7d27e184ba141ae8598e339626f82f49684065fe4e2a33b748ecec7d0581fe6e7c6b6887cf8224d874d5d80e845c41676edf0b78bb069a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_5084_JIBAWALVCVCAMXNHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e