Analysis
-
max time kernel
599s -
max time network
594s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 11:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shorturl.at/klBNZ
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://shorturl.at/klBNZ
Resource
win10v2004-20231215-en
General
-
Target
https://shorturl.at/klBNZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494473327367835" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe Token: SeShutdownPrivilege 4460 chrome.exe Token: SeCreatePagefilePrivilege 4460 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 996 4460 chrome.exe 91 PID 4460 wrote to memory of 996 4460 chrome.exe 91 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 4516 4460 chrome.exe 93 PID 4460 wrote to memory of 1524 4460 chrome.exe 97 PID 4460 wrote to memory of 1524 4460 chrome.exe 97 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94 PID 4460 wrote to memory of 3796 4460 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://shorturl.at/klBNZ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3e039758,0x7ffb3e039768,0x7ffb3e0397782⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:22⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:82⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:12⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4896 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4988 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3928 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=884 --field-trial-handle=1800,i,7745159201986779939,9881652649106212025,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:312
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:5612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c3d36e96eccef530d4f8d5ad382db611
SHA12598cf2c814fa74aa8b598b6ef785514f0497ad1
SHA2566192c50748af0b9f35490fe3026363735ad56787090e66d7eb18c73f0eb56875
SHA512037152df6f7f74ac277417debf96c81c151e13380d6013bfadcb9d365aaf3f8adb9b0b155e1828ef860154036332606ee41d568f36570d1098f44cf632689920
-
Filesize
6KB
MD552ec5f343e88bb7d6c2dc67ecd3fa1f2
SHA180b20748dc894c955a498d0f091ed229567a7cf5
SHA25693708ebc941880ead6cc397ff9ab637e606b06f34ac1fbe01126b7caac467625
SHA51207a32581b22c027b01addf9fd68af958d714f826a434110d615699c435a219198790bd5a23062f292db24dafe83fd633577d58d9a9cc8ac7e3df05d86ebe8d0e
-
Filesize
114KB
MD5c9340cd76c9c234a7bbefc721fa5ed22
SHA161e1f6bed12c3cc70ce79e8f3ecb694845f72537
SHA256ffadbcd6bbf1d447f2a26ab277f56753ba5204928d2f0cc33ead0623428d2ecb
SHA512667a7d384b7c0a88d61e96f67230ce0463da1da6b9997720e37d512e7db73a933289de0cd23e8a58420b43b8928726e880eac955690bc52821c78119ba09515e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd