Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 14:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/JB1SDYhD#tGaGZ1HFMwav3q-uoWepMABjwqjmQo_oT2YiL1qI90U
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://mega.nz/file/JB1SDYhD#tGaGZ1HFMwav3q-uoWepMABjwqjmQo_oT2YiL1qI90U
Resource
win10v2004-20231222-en
General
-
Target
https://mega.nz/file/JB1SDYhD#tGaGZ1HFMwav3q-uoWepMABjwqjmQo_oT2YiL1qI90U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133491966037879684" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1492 chrome.exe 1492 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1492 chrome.exe 1492 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 3640 1492 chrome.exe 85 PID 1492 wrote to memory of 3640 1492 chrome.exe 85 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3828 1492 chrome.exe 90 PID 1492 wrote to memory of 3188 1492 chrome.exe 91 PID 1492 wrote to memory of 3188 1492 chrome.exe 91 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92 PID 1492 wrote to memory of 2432 1492 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/JB1SDYhD#tGaGZ1HFMwav3q-uoWepMABjwqjmQo_oT2YiL1qI90U1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3bd79758,0x7ffe3bd79768,0x7ffe3bd797782⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1776,i,13540621932208985692,14666596332836859114,131072 /prefetch:22⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1776,i,13540621932208985692,14666596332836859114,131072 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1776,i,13540621932208985692,14666596332836859114,131072 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1776,i,13540621932208985692,14666596332836859114,131072 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1776,i,13540621932208985692,14666596332836859114,131072 /prefetch:12⤵PID:244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1776,i,13540621932208985692,14666596332836859114,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1776,i,13540621932208985692,14666596332836859114,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1776,i,13540621932208985692,14666596332836859114,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD55491c82fb785da0eea8899943b0cbe51
SHA1d0d464143ae48808918b2888c59138992ffba94a
SHA2561f45e9509554040f60db54c93a11fb9cb1b39a9d48cb353c5945c3c01c696589
SHA51233a421f336288e806c7e10f38f6c29971d62c441e05513052e6183180abe371c935cbdbb9e3a61e494d72cf2f0ce2944e153a6c911ffc26da64ecc8178c5454c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD558df8612876de87e211f9d1611780f7c
SHA13e0f6fbb0462b135658d39d1157c041c7c263cfb
SHA256d7191ed481064c07f6a5023ff3a091dc6258e42cdd13cec6a151f3b4c06bd2af
SHA5129ffc4236829e4141fd5b5e1b44de9c5853958652e0625ac49d7ac39e2e0c338b2c75630931446e1f0a5939ebaf5ac487d04aa585634ec9e4faf8f12ced641c2b
-
Filesize
1KB
MD5f1bc9e4946b893d76894597b41e090d2
SHA1dc38793b9a473f9251fd2df8a1f40f8ffc541bbe
SHA256b401caa6f5a2f71c080672b7c848b168144aca0ab3fe5cf4dfb9d7bc32c25728
SHA51213cbaa905ecb4364ce0a9cebc355241abe100acf789354fa2d0c75f8145ae07c7621c4d0eef87a19d1a4187c41cccaee1f46f9f5512316e537e7053cd3b64538
-
Filesize
538B
MD5e64ee0178b1ae48ddef7ce2c08384556
SHA111616c8876a7366c22aa84851586dc5a3942aba0
SHA256fe9f93d6ff52d40ace258ece53d834940b251387086fcaafd15e86c314c0f7fa
SHA512b46d7a9b5e8cc8e9115561884ac66de97af320cfc23a48f113a20dcc3a4aadb24b09e6443ec5a1ab82a94c1022c55507879808147d5789b7c643887ef96326d3
-
Filesize
6KB
MD5cb33ae5730e915ad3d230919488ef522
SHA14c05ebfac821d1f461ef45b2a93d806b0efb27c7
SHA2565f8f5f046ed9b15c54ca95f7fe25266a997a40616fbca2941fe5cbbf5557b995
SHA512ac06db5a341565c5b5f47fa8d135959b1332145cd93f5ea3bc8f8da8abaa30e24496aadc61001dc65086b9d2206a7292c5743779d35634816c32841d29d65270
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD52e6e07b7d5e928c43068d6c750e7eb62
SHA109bda6a89f50a429a307ae8339cea02d3a938463
SHA256d15c6855f060de14a619fef026ed377a37dba01a98241b4f04bcb04fd83017d3
SHA512ea9a9c8b2035cb8823701e41653c50629d47658311e7579b97aa7e92aa22bffddd942d2b8ce0df3a6596e7a52161183161c8559193dd79e8945ef7f2eb7c9d4c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57bc5b.TMP
Filesize48B
MD55e5810d5a9854e1ae21843d0cd01aeb5
SHA155551301d8224fe52339fd04b9406f9566938b79
SHA256028e9b2a0ba5c9b4831c573751b8b6327a54b1e8aa1a5c9e79125f050a2df275
SHA512227ec2a174551d0aeda82f94f2fd1c1fe4098e3b0df18b713ae5df1fb117f2b2199f75fe3686edb5bdad4aee46f5dfb717070fd6d1bb614e619ffe52eb595c15
-
Filesize
114KB
MD5b283d9f27940da703f535dda13e7d14f
SHA16fd66958d90426cb11e869d3ba12be42fa7e8e48
SHA256ec3bda06e37d66677a015a7ef8ac080d2d2e9f1b59fff80c131a1e109f287b2e
SHA512f74ab3bdcb8f6403b47e558b176fecb28824d276b7af4bc1f39cacb14cc4afb8c00dc4cb68fbc17a2a4643ed58c4244c4236c5b975935d28b5cc52074da00ded
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd