Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 11:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
https://google.com
Resource
win10v2004-20231127-en
General
-
Target
https://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467666241424897" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4076 chrome.exe 4076 chrome.exe 5040 chrome.exe 5040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe Token: SeShutdownPrivilege 4076 chrome.exe Token: SeCreatePagefilePrivilege 4076 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe 4076 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4076 wrote to memory of 4716 4076 chrome.exe 55 PID 4076 wrote to memory of 4716 4076 chrome.exe 55 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4748 4076 chrome.exe 88 PID 4076 wrote to memory of 4296 4076 chrome.exe 89 PID 4076 wrote to memory of 4296 4076 chrome.exe 89 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90 PID 4076 wrote to memory of 1736 4076 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff62d69758,0x7fff62d69768,0x7fff62d697782⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:22⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:82⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:12⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 --field-trial-handle=1904,i,3692584637055953208,11832543445886350677,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4500
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3512
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5fcc10624615459d2b6ebd928a36bdaf1
SHA1d52b228aa5fd8f790ac2c7eb49bc0adfc5989c4a
SHA256e58936de1f28bd33e2dcbed5701f0bf3b844a33e7d69114f41a43631dddac1bd
SHA51270f77b92c5efd2deeaed6b9260c77952ae59ec485a90a8ecd0b2b2af0aea72ed6d86d3ed4a54e6102483c3fbaa87485f7944a7a6afa7bee20d28ffe015d8557b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\fed1433e-307a-47f3-84ee-9cf212f66776.tmp
Filesize371B
MD53af46348b7eda92ba6ddd04a871ffe87
SHA17aaf700c27e2aed52cd1957720f8ce398100d255
SHA2565b739b5fc0c0e1aa0a40a29c93837fc138f1bddc3dd5582d0be7e82a06606dc0
SHA512b31460c325b2a8cf7e1f64ccdee63aaa37b95aa5efb713868acdeb1897f0cdbc5c36af070d2e5d614bd50fe7d60cde7a9e54b8ce4e35b8059c647297f058c5ca
-
Filesize
6KB
MD51b1d283c50df907a510bcd9eb7e18c2d
SHA10abf99d2291f475cfd78053a30eab93e3f4e6cbf
SHA2565178bc4b7ac1046ca891388dd82cf4e6fb3dd9f81d409cd9f9a337e30b1eaa5c
SHA51227771d562dfb7e96d7c8ec6adf81e79bb9eeb19c11048a677e4641e7d4bd71f6c4ccf06c1391638a25e40c2739ba7f0cff6d58bf270532f0dfb4e8d24d00b47b
-
Filesize
115KB
MD57b320c2e8ed21feb20a53a936a25e648
SHA1020015091d854c173c8506ac11dd0bca7261b0d6
SHA256bc630ce2c14054f2d463a9f734075da1cdab4f67096745f6ec8ffea80b16d4df
SHA512f537f9be3d169b661817ef11f20cdf4279e910b535c83fda20fcc6f71db1b73ee94fbd23efd44e603b0cd6f67497584ab1dd8a5df4648707c5f55903734db429
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd