Analysis
-
max time kernel
56s -
max time network
52s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
12-12-2023 14:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d3k81ch9hvuctc.cloudfront.net/company/PVp2wz/images/334f2e0a-c335-4192-9f14-0808d0bb7dc7.png
Resource
win10-20231020-en
General
-
Target
https://d3k81ch9hvuctc.cloudfront.net/company/PVp2wz/images/334f2e0a-c335-4192-9f14-0808d0bb7dc7.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133468635137767712" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 228 3736 chrome.exe 70 PID 3736 wrote to memory of 228 3736 chrome.exe 70 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 4536 3736 chrome.exe 73 PID 3736 wrote to memory of 3228 3736 chrome.exe 72 PID 3736 wrote to memory of 3228 3736 chrome.exe 72 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74 PID 3736 wrote to memory of 4764 3736 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://d3k81ch9hvuctc.cloudfront.net/company/PVp2wz/images/334f2e0a-c335-4192-9f14-0808d0bb7dc7.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe736f9758,0x7ffe736f9768,0x7ffe736f97782⤵PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1812,i,17965522460450201602,16328538267717309176,131072 /prefetch:82⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1812,i,17965522460450201602,16328538267717309176,131072 /prefetch:22⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1812,i,17965522460450201602,16328538267717309176,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1812,i,17965522460450201602,16328538267717309176,131072 /prefetch:12⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1812,i,17965522460450201602,16328538267717309176,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1812,i,17965522460450201602,16328538267717309176,131072 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1812,i,17965522460450201602,16328538267717309176,131072 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD544bedea8ea843b5a98e5923198896ed9
SHA19bf1b1a86f886ed8491ea14c0efabda7e51da962
SHA25618733f787fb9cefe51f8af583d8a9536114ceb57c23a9f51993853ef38dfd083
SHA5121dd6ce2fa94bb48ebbfaedec692d91fe5f6b5b2ebf9a5774f7098d52e06370da6e31235b1233f673bad7a303dfd3deaf52dcccaed8ad303caf9042e2c09349cb
-
Filesize
6KB
MD5438444fc0982c34951d1e26ba5496326
SHA10b77e19a32f9cd0c4dd1479ff5e1f8c1036a2fc3
SHA256c3d792737e60cd098ee4074a22c3bf4b6e44338fa9e05476e651b62d2ca678f4
SHA5121267458c8b4c0a5a7e4d8a5f0b3a073999cd0cd70b2dda989c24e7cbc7a2f967dbaf30eda63122fb7f7794660cc4a33745b0754ba217f6f2bf1356f789b068e0
-
Filesize
106KB
MD5dc7aab36b034159156a8988a0fcfe790
SHA14da4f3fd4c172af2dc8a60bf3199fd35ca1b39ab
SHA256048603bb4cf9940a1f0c0979b79c8029aeb7bb75f46e8418bf901d93998ce23a
SHA5126dc105840777a6e1fad1041985c4349147d23e2bebc55739f7d54ee4986f919679b744d4e17ac1868e78ae8812fc9051af63c03b73cf7dd4e4adfb762fe84d7c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd