Analysis
-
max time kernel
600s -
max time network
489s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 21:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://surl.li/oebxu
Resource
win10v2004-20231127-en
General
-
Target
https://surl.li/oebxu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133468044679279548" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4856 chrome.exe 4856 chrome.exe 5472 chrome.exe 5472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 3336 4856 chrome.exe 21 PID 4856 wrote to memory of 3336 4856 chrome.exe 21 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 1528 4856 chrome.exe 90 PID 4856 wrote to memory of 376 4856 chrome.exe 91 PID 4856 wrote to memory of 376 4856 chrome.exe 91 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92 PID 4856 wrote to memory of 1464 4856 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://surl.li/oebxu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff928c89758,0x7ff928c89768,0x7ff928c897782⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:22⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:12⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:12⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3852 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:12⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4732 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4752 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:12⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:82⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=920 --field-trial-handle=1876,i,12171822510746710229,16432602055577847911,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5472
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD565c95b8dd0d1fbd76c2ad1e6b8f06ffe
SHA15012c80bf4cee03f753493b53d7d7afc94a02274
SHA2567b753520ab20fa730eaaca11958e79d6759740f5ffe5dca077249ea38e4dbce2
SHA512eb34feda6c41cedfdb57392b3e33b61ba5ac6bd9584e0b491d0adce389baa25acf2683bd23b3fa5bf3684a9e15fd013099756db278510fa12ebab228462d39af
-
Filesize
3KB
MD5a76311bee36ca68d371596d5ecd8b392
SHA13095c90b94b31d312dc5ae843b3be3bf41e3d9b2
SHA2566d8c6f0f0ce68dcc7e214c0816f62157808c1555383792a4163bd74df74fe53b
SHA51212759dfd15c56a8658f021d17ce61c563d1b0b0c85d37d878bec88da32f0901bb16e75793c473699a570e2ea7059fecb07809f9c6cc6432bb12496e36d622b32
-
Filesize
1KB
MD5557d47a13ee2928997a6f9c96b769175
SHA10151bad0d5bddacbf3a06f5d85d736ec435e54fb
SHA256b3216cb2dd845adfd4fcfe078d81e46725ef61971493335ea86cd9722cb37d29
SHA5125c28570bf22a0cf1990d3aa5e5665ec26a63055728f445da0b720e66966a9fd56d96e35ca2f42fc65792680e3aa731a092f00789f682837b3527673bd8c5f638
-
Filesize
6KB
MD564d90943622471de1e9aa219cfac8616
SHA18ae944ab6caad02a285096a9c72dffa3cf52a061
SHA256607a39dd019f4d3ded3fab141928eec9aa44bef5e6063efec8c19fba511ec9a3
SHA5123c01d9fbc62f9ce934fa49b70fc232816b2f3f73683481d2da8c9238c42cef2787836a115cac0f3b152f31832f61bf2b84cb554ce9323e25df9863a59a712584
-
Filesize
115KB
MD59afded9bfd1fb438a19ec83a1eef708f
SHA1e84baefde25abe2144e40af0cd9e5371062a3695
SHA256e5a8e7898a7f2571228fca7973dbcb69e26a38db0b2ffce24fee1bb38ca506c6
SHA512cdc50cb2ffd47be09af8e6f0534c6375eb62f838599d564f84003f27b886c9861169ed4b587cd0eddaa5f71f50c285ae444d71c4444a4c134511ce34d04de01d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd