Analysis
-
max time kernel
598s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/01/2024, 09:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bio.to/case12
Resource
win11-20231215-en
General
-
Target
https://bio.to/case12
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494386612873866" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4696 chrome.exe 4696 chrome.exe 4784 chrome.exe 4784 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4696 chrome.exe 4696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe Token: SeShutdownPrivilege 4696 chrome.exe Token: SeCreatePagefilePrivilege 4696 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 780 4696 chrome.exe 27 PID 4696 wrote to memory of 780 4696 chrome.exe 27 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 1960 4696 chrome.exe 86 PID 4696 wrote to memory of 4368 4696 chrome.exe 85 PID 4696 wrote to memory of 4368 4696 chrome.exe 85 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84 PID 4696 wrote to memory of 2340 4696 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bio.to/case121⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9c1f59758,0x7ff9c1f59768,0x7ff9c1f597782⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1808,i,2003924717084992748,15913148963895532681,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1808,i,2003924717084992748,15913148963895532681,131072 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 --field-trial-handle=1808,i,2003924717084992748,15913148963895532681,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1808,i,2003924717084992748,15913148963895532681,131072 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1808,i,2003924717084992748,15913148963895532681,131072 /prefetch:22⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 --field-trial-handle=1808,i,2003924717084992748,15913148963895532681,131072 /prefetch:82⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1808,i,2003924717084992748,15913148963895532681,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 --field-trial-handle=1808,i,2003924717084992748,15913148963895532681,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5f163230b3e5c11130c8f5d5a0eb73a43
SHA1ad8f77765de1bdc2109b97f535a0ce4bbbdc6e0d
SHA256e105970f39d619b6f5188c1a683d64802ef1f1e2035dfea6bfedec9c3b55f377
SHA5126ed3bd0710e81e554ed8958984bb88fdd40ec930061d7753fb190615e88d922c12d7f8f6521bc0173c402547e2773c0029b61b5d90a0a99186845f256b5ecfe9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7002f43e-0772-4525-9a28-9b1af0752823.tmp
Filesize1KB
MD5917fcbda1b806e1488d6719b4d0b9de6
SHA14c8a4ee5b33e4bcfe01ddc9543569a5250558e38
SHA256eeade9d4952f7bccdd4a547bf0b991aec672e8a5199b1b570070b735ac007c0f
SHA512bc0954863dbd69e42ed8c40de61074907590ac70daefba26512f7f8637f54b5934cad06e85432f93247848c12f7a06a08b409a8e7bb228f46133729b333bcb6a
-
Filesize
538B
MD5ea5f0beadfffecea0cb8f1e765741616
SHA1ab8b46b1e45890d7d9d609fb679b0013230ddc14
SHA2563e251e17551590a9aa522f464874ed6e38c8561021cdac3293206a6a79ae3ea5
SHA512552f4db58ec682e4e75045b417ffa036ada96cc02a256e21509924d88e0007018aa7e606763638b4ae4a47b0da651ced3617c4501c649149cb57dbe5b27a69f7
-
Filesize
6KB
MD5ca840004ad835b0a721f44f3f33403a2
SHA1f094813c63078a07745c9b5cae2908f837abfe07
SHA2562ed1b53de82fc54a9928978adca553d792e1ed00bf6d820506bc633c5e15b713
SHA51203e85ff9267fc47bc23f32f500eae28ae5ab0a6256b9238d202ab98d3b5285c14982e94c16a42ea705a7259f92e42591bf5985e41819d57771ad3ceda0b544f5
-
Filesize
114KB
MD514293d28f331c51b6b69552552e6e9d0
SHA17612a44c21f90484a8af6175ede2bc001a648d21
SHA25637b9f2fb1e8f10256b4450dae7d2f2f74be6d2982de45f5ff93d70bd26dc93ba
SHA512e7191de5e42ce71c1a682ab724d921b7ef15b83c8286b684f70f14e5d54b5caa4def59ffd17a954d808e920f6e68930819f0d9cf2a4b1e9bcbe0a996ccd7b55d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd