Analysis
-
max time kernel
0s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2024 22:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com/bebra.dod
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://google.com/bebra.dod
Resource
win10v2004-20231222-en
General
-
Target
https://google.com/bebra.dod
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4064 wrote to memory of 3052 4064 chrome.exe 14 PID 4064 wrote to memory of 3052 4064 chrome.exe 14
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffde3a9758,0x7fffde3a9768,0x7fffde3a97781⤵PID:3052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.com/bebra.dod1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:22⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:82⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4872 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 --field-trial-handle=1900,i,11780148249532885848,8041445447990670849,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872B
MD593fabdaa93c28e4151f4a40b35d8e44c
SHA187010d5cf679e415df9244939ee0cb46e430f0b3
SHA256c6c1121479c6a8e671eb00730916884e6d8c51275695bed1f02d403ecdf637ad
SHA512b55367f8d1925af6c4fb1724579ab1ca71fc36725867367ae1a80892e4bf655b276df11dc69b62a33d54e3f07b60540d4c89c38b4baa5e0439aac2f3543b6e7f
-
Filesize
6KB
MD5058898e356ef09416c1ccc2553d2d890
SHA11611ae077588ed94362173804dc9e2bd7151b1e2
SHA256f4962da356df345140dd70518e8317b1ce93cc4ac0d3bd6c1fa299b8908048c3
SHA5127dca61f195b23a7d81f7d19556b858942ead22b4a9062ca2cdd74400dd431c5aee95d7b216ada6b9063a84d7a958c51741a0e53e5fb67b8585755180951a4614
-
Filesize
6KB
MD5db82f35e0247ed6f96c349bae3ef1aa9
SHA1531844e91fa52e858ce0723a457364c9bf5aa09f
SHA2565dad8a879c12484fe19b290cf5b3b3ae03c079c47a9e83a68dc58f6311b546cc
SHA512fb5a1423e76be791d941a23d94779a7e22a8a139f80a1ef0846d523d24e490dcbd6c93b687fd6fefb6743874ff6e2e17d6c453fe4e3ab512f3bfc3aa99fc094d
-
Filesize
114KB
MD55df38e46718a8bfe91f8323ec5d5f860
SHA1ccd765363e3a58bfb36ea2d1c415126074366ac6
SHA25649bc6d46a5dd0750711c5ff0b311b904dc29306952b66402d0dfd0fc7e9bee01
SHA512e2e0193cb0ec8596f339c0d458ca29f7021b5dce4c67ba03df50e3edf4df0d766f74feb0de5c6fabe2f8554e2b1f7105ecb70868b3bde244ae3f45173ad2cc35
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd