Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 16:51
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-8c5fdc51bb1b4e1a89ab6736090ef856.r2.dev/background.html#[email protected]
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
https://pub-8c5fdc51bb1b4e1a89ab6736090ef856.r2.dev/background.html#[email protected]
Resource
win10v2004-20231127-en
General
-
Target
https://pub-8c5fdc51bb1b4e1a89ab6736090ef856.r2.dev/background.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467870889159936" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4432 chrome.exe 4432 chrome.exe 1076 chrome.exe 1076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4432 chrome.exe 4432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe Token: SeShutdownPrivilege 4432 chrome.exe Token: SeCreatePagefilePrivilege 4432 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe 4432 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 3408 4432 chrome.exe 29 PID 4432 wrote to memory of 3408 4432 chrome.exe 29 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1436 4432 chrome.exe 88 PID 4432 wrote to memory of 1208 4432 chrome.exe 89 PID 4432 wrote to memory of 1208 4432 chrome.exe 89 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90 PID 4432 wrote to memory of 4328 4432 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pub-8c5fdc51bb1b4e1a89ab6736090ef856.r2.dev/background.html#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff130e9758,0x7fff130e9768,0x7fff130e97782⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1868,i,1019522906573014232,10570840592268102958,131072 /prefetch:22⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1868,i,1019522906573014232,10570840592268102958,131072 /prefetch:82⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1868,i,1019522906573014232,10570840592268102958,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1868,i,1019522906573014232,10570840592268102958,131072 /prefetch:12⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1868,i,1019522906573014232,10570840592268102958,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1868,i,1019522906573014232,10570840592268102958,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1868,i,1019522906573014232,10570840592268102958,131072 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 --field-trial-handle=1868,i,1019522906573014232,10570840592268102958,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5c0c5141cb35c89113e2cdf42f6d0c648
SHA1d0d1c0fcb7fbf2f40bce2917ad2194d2b011f56c
SHA256d4cbc41b0171078ed8533469c8824eb0b5a64eac94deb87244fe43f9bc3d53d7
SHA51221a8e33e97600173635e18f6591b823a0ca50641c5f9a7972dbe432dcf39519447228bfe850445d1c2840cd6697bbec0e3a42e075f619bdc4a814492a615cb09
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\20e6301b-ad33-4f47-b073-ef0491dc4fbf.tmp
Filesize2KB
MD5d48864f941a7e59a7e73a539840d7236
SHA1eea0111717462c115b5e897c2816a1f76ba69550
SHA2561537ff6b3b2c669b9d0c2cd57e78a4020241c443283ab88dc6c78fa56bffa333
SHA512e7b47b796fe1ec6f5a64b33d9fcca9c043bb6839562adffcc5d8572abfe344d930ca1fbb37c249201c9b7559eb0cdeb4d14a0feda3cdd550b80d2de120ef2609
-
Filesize
875B
MD5fb0ec1190a1adb5736542490485197d4
SHA1e470cf1c45edbcd1325fe24b5bdb7f0614004f61
SHA256795a70e075d02feae38560e77bddb4c0765112e7bfbc7611effbfbd6cbe42177
SHA5121bdbdddfaa3759f6b296c14eb0da7891715bf09b8887a724dedb674abc27ea826a74360bb9f29f01a4e6fe09a50848ac5e9fedf4f4b319ab2e91410a3b3315aa
-
Filesize
6KB
MD5eb8580fac8b2633e46f5c340e5c3cab4
SHA10428e9bec2160a12b31675978c6fb6fd2fe23577
SHA25609e96a46f86156218002add0edf5cf2816a4defb21e76daeebae423f61c7d661
SHA512fd459b9362c5db5ba6c1ab17aed5ec0a7c0a3c78005f6fbffb3575d44cbe73fa8f25700df235e6385f6f0f52e16d742c516b279709d12ecd13fde06ae7d8cd6f
-
Filesize
115KB
MD59b98a64feec3255005157eb23120083d
SHA1ddfe62058243bf3443700b1288fa6a1a5f73a8e4
SHA256dfe895eb063f6acbed9fd92e2e228af1e4c4a4a1744096c78a12bd35f7698773
SHA5123c869616a524211d2f1cbf0c856cc851f5f8cb7da3b5ff17976157785e7a843a333b35d4120561b08fde106a9d3b328ae5330ef990402dd2143ba84b082a807b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd