Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 11:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.amd.university/
Resource
win10v2004-20231222-en
General
-
Target
http://www.amd.university/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495336520896201" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe 4532 chrome.exe 4532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 4316 1476 chrome.exe 57 PID 1476 wrote to memory of 4316 1476 chrome.exe 57 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 4604 1476 chrome.exe 91 PID 1476 wrote to memory of 5064 1476 chrome.exe 92 PID 1476 wrote to memory of 5064 1476 chrome.exe 92 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93 PID 1476 wrote to memory of 1236 1476 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.amd.university/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf15c9758,0x7ffcf15c9768,0x7ffcf15c97782⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1896,i,7763262644398517318,10196237359440244967,131072 /prefetch:22⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1896,i,7763262644398517318,10196237359440244967,131072 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1896,i,7763262644398517318,10196237359440244967,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1896,i,7763262644398517318,10196237359440244967,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1896,i,7763262644398517318,10196237359440244967,131072 /prefetch:12⤵PID:3664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1896,i,7763262644398517318,10196237359440244967,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1896,i,7763262644398517318,10196237359440244967,131072 /prefetch:82⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1896,i,7763262644398517318,10196237359440244967,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a4c72b9c82d7dca0040cd08861108c94
SHA1cf8b0c9f2ef333ca1673382c66a5e302fb251b4d
SHA25634868b33f019718ac1f1c706364d9bd897bedbade75edd624bacce5a30d71ff7
SHA512fd3ac2bf4d697da5cb0760085480bd1bd108100b0f56550b16abb9d71e0333f7e0d126f2906b0be4a931cec319addf5c7130d8af7020aee1f32c1d9d1caa2fd6
-
Filesize
6KB
MD57777e2413347df72b90d3b2eb3f39e4b
SHA1d2ad27c16e5481f1d1d1937f66662625534197a8
SHA256889053cf4442f2b6f8a17457502b5e91377df527564d297f51775f21273c5cf6
SHA512758ea02a8b257f6dfaf4059334d4e3d1bc1c17a55283bbaa4e88d3992c5872b004953cc596f38747f8e5276400a951c76779f3b896c672e978a8c1c5d9cd7415
-
Filesize
114KB
MD503ba8a1236978d643300a443e2c5e4fc
SHA1c9dc686de59273c2ea841c6f06ddaa17cb583cd7
SHA25655bedce96dba2fd90c40bafe4b4a92b1b2e5b3228da30cf1e23d48edb6571cda
SHA512d5f81a8ed900bc47c2c68ca94041ac04568b6fec8cbabf276de8e1266acb2b9f72a5612501fda06bfcaf0cb407406bd1e13fcc290efe2291f0e4e2706d57a749
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd