Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 02:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://forms.gle/PpkrXRGNHLa49F7P6
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://forms.gle/PpkrXRGNHLa49F7P6
Resource
win10v2004-20231215-en
General
-
Target
https://forms.gle/PpkrXRGNHLa49F7P6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133490680569710630" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe Token: SeShutdownPrivilege 2840 chrome.exe Token: SeCreatePagefilePrivilege 2840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 992 2840 chrome.exe 82 PID 2840 wrote to memory of 992 2840 chrome.exe 82 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 1364 2840 chrome.exe 98 PID 2840 wrote to memory of 4156 2840 chrome.exe 96 PID 2840 wrote to memory of 4156 2840 chrome.exe 96 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93 PID 2840 wrote to memory of 2692 2840 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://forms.gle/PpkrXRGNHLa49F7P61⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff968e39758,0x7ff968e39768,0x7ff968e397782⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:12⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:22⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3948 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:12⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2364 --field-trial-handle=1900,i,16681867134900829031,17342741096938566458,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD57bf15220cc98ca735798223974421ca1
SHA1f7dec8f40e80f8eb8eb1117a0e09f8cc073423b6
SHA256f9baf339865b6c8b7d1913fac90d3f03aeb2e147084cc298cf917e92e9278936
SHA51230694eba2fd6ef1e2e9fef2a97d59bdafa11688c8f081c2f52d3a79f4dc253aff2cd0cbd46b94a0faff50193caf4a1fe65628a48137926c9df11fe4c36530517
-
Filesize
1KB
MD5741b5bd9b880a3c9e398e98953a2ed6e
SHA1c4b9c3511e1f489457483545605be364c3f861f8
SHA2564a88c9a5b1064beec3fad74c5fcd0d37687d5ac815dba124c6df87fccc088770
SHA512236bbcfc25384d2d11cbdaa6773bd586627fab0b61ce2eb4783bce8913b2b63635d4a1ecb30d760c5ed1739c1e8110f667cfa4c2306e5e8b5f8b8db92bc716a5
-
Filesize
539B
MD540bd5c5ac3b2e5a4a8dbd04a94f5cc3c
SHA184ea2d3bc0ae12878c70eadd3c85fc63bfe2e279
SHA256c7ab27af39a4d29224228e926c11a0abdcd7e0102e32fb4d3e75eb41d37ad304
SHA5123f1cf736f45267535f413f40101bff6ac10acfb85f2a2f84795b018151355658202d56967eb181847b4516d55953556190c8c6f4bda806533764fb8714641061
-
Filesize
6KB
MD5083dbe867b9853ce3f4cccf1621b31cb
SHA122d131fd0529d63eb06821b94026f57c64305496
SHA25647d148dd46dba4df2243b9cba4716f3a1c36454ce6820aabb24647d184a3cdb9
SHA512a3c256eba73c22fb1019e516169c1bbd62c1663110b27c285c07f2917482c8adb8e09661c495ae6a0e9fb38a969cb91c45b386af7ee860d40e839341a2efc385
-
Filesize
114KB
MD51fbe02e36a85dfd7fa534c5497deaf98
SHA1eaab3d526581322f6f638574bd41b81a9ce9c8b2
SHA2564b136bdd13e53cde440f650d0669901f60ac7c6513cd76d936449a4fbecf2da8
SHA512cee7850b0a01e6ea59c5dbfdb836508438824b61e466d7255808a4e1ff09fcbcbe7880066c83f11be6d6479681a32aa0418538b40fdbca86f0303aa30cde076c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd