Analysis
-
max time kernel
1799s -
max time network
1687s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/01/2024, 20:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win11-20231215-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133490473717380524" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe 4272 chrome.exe 4272 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe Token: SeShutdownPrivilege 2452 chrome.exe Token: SeCreatePagefilePrivilege 2452 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe 2452 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 4924 2452 chrome.exe 14 PID 2452 wrote to memory of 4924 2452 chrome.exe 14 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 4708 2452 chrome.exe 29 PID 2452 wrote to memory of 5088 2452 chrome.exe 28 PID 2452 wrote to memory of 5088 2452 chrome.exe 28 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27 PID 2452 wrote to memory of 3744 2452 chrome.exe 27
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa418a9758,0x7ffa418a9768,0x7ffa418a97781⤵PID:4924
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:22⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4500 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:12⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:82⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 --field-trial-handle=1756,i,16681389501491815491,9678257190861090010,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371B
MD50660be515792f239a7bbbdfa50308cfc
SHA1463a041750c1c6140d9c30582912d8211254a7ea
SHA256bb1799346f8babc621342043d8527154a6440b188c2faa98d95e1e421250541c
SHA5124b0a65f16e92904629c0643a7d7259cc58ac65ebbc8503435f43fc1591afa21d7115a79e872fa0a9faf221713469e04cf80aacffe3699c4ec3b60fb16b7d70c3
-
Filesize
6KB
MD5fd885bf7e045e2ead48d975422bf8add
SHA1e3cb2eb34f58dff326b57732a3f6fe0bda816e9c
SHA256926da03bcfcfd701f5c8af8ccc2db32d0e22c13e60075f6f97ccf418bfaa5e8a
SHA512593d1d62edc780ebbb6bd4eb2d3762b162d85d9413e8c501f6716ac029dc04ed8db62cd9e7c6d627c77035902ef945f61540341b3c0cea44670ab4a3d12223af
-
Filesize
37KB
MD512c4cd204628b65e4e384439772410d3
SHA15cbedfa6f9a0ad82c097affd6778dd14d9d3b783
SHA2564328146dc03040579bf3d1eff3e3a49b9983e4816411e89e29cd7cbc9cc99b1f
SHA5126b6ac37b2feca0be20405877bb453c50ebc1f1918780f479ae8c8a0cc2bd2ba5ad777a413cccef02f771ecd58cfe98a7a9580bb00ae0e1beee5fc1f926813805
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd