Analysis
-
max time kernel
32s -
max time network
23s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
15-01-2024 01:28
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001MXFBuQNJMiripjpViAa_BglRYwM-nVyUjPEhFEFpORGBX_BCcOzZ8Tmo1k55cEzvCHy6dMw_hXq0j30eoL7thyMwaWTa0GW1eJiq_vpDn2dwdSNAzgThzQD6PIjVd6Lq1kSK0bZI0ttO4JZdzP7MGvhF2zIg1314or6Hml0Tohq_lwOjCFwo4g==&c=4ry94kPSKqTta0a3AERm4gWZnc0LtT6686idwHezsV2q44iRJyo3hw==&ch=018MNFoWL3OtVmKqcXkvVciVtDyyRfrhgcMu8BkoOPiLbStR0ZgJhw===&__=am9obi5tYWxsb3lAb3BlbmxpbmsuY29t
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=001MXFBuQNJMiripjpViAa_BglRYwM-nVyUjPEhFEFpORGBX_BCcOzZ8Tmo1k55cEzvCHy6dMw_hXq0j30eoL7thyMwaWTa0GW1eJiq_vpDn2dwdSNAzgThzQD6PIjVd6Lq1kSK0bZI0ttO4JZdzP7MGvhF2zIg1314or6Hml0Tohq_lwOjCFwo4g==&c=4ry94kPSKqTta0a3AERm4gWZnc0LtT6686idwHezsV2q44iRJyo3hw==&ch=018MNFoWL3OtVmKqcXkvVciVtDyyRfrhgcMu8BkoOPiLbStR0ZgJhw===&__=am9obi5tYWxsb3lAb3BlbmxpbmsuY29t
Resource
win11-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001MXFBuQNJMiripjpViAa_BglRYwM-nVyUjPEhFEFpORGBX_BCcOzZ8Tmo1k55cEzvCHy6dMw_hXq0j30eoL7thyMwaWTa0GW1eJiq_vpDn2dwdSNAzgThzQD6PIjVd6Lq1kSK0bZI0ttO4JZdzP7MGvhF2zIg1314or6Hml0Tohq_lwOjCFwo4g==&c=4ry94kPSKqTta0a3AERm4gWZnc0LtT6686idwHezsV2q44iRJyo3hw==&ch=018MNFoWL3OtVmKqcXkvVciVtDyyRfrhgcMu8BkoOPiLbStR0ZgJhw===&__=am9obi5tYWxsb3lAb3BlbmxpbmsuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133497557263911296" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 200 chrome.exe 200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 200 chrome.exe 200 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe Token: SeShutdownPrivilege 200 chrome.exe Token: SeCreatePagefilePrivilege 200 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe 200 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 200 wrote to memory of 3160 200 chrome.exe 71 PID 200 wrote to memory of 3160 200 chrome.exe 71 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4544 200 chrome.exe 73 PID 200 wrote to memory of 4252 200 chrome.exe 75 PID 200 wrote to memory of 4252 200 chrome.exe 75 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74 PID 200 wrote to memory of 1312 200 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001MXFBuQNJMiripjpViAa_BglRYwM-nVyUjPEhFEFpORGBX_BCcOzZ8Tmo1k55cEzvCHy6dMw_hXq0j30eoL7thyMwaWTa0GW1eJiq_vpDn2dwdSNAzgThzQD6PIjVd6Lq1kSK0bZI0ttO4JZdzP7MGvhF2zIg1314or6Hml0Tohq_lwOjCFwo4g==&c=4ry94kPSKqTta0a3AERm4gWZnc0LtT6686idwHezsV2q44iRJyo3hw==&ch=018MNFoWL3OtVmKqcXkvVciVtDyyRfrhgcMu8BkoOPiLbStR0ZgJhw===&__=am9obi5tYWxsb3lAb3BlbmxpbmsuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff845d69758,0x7ff845d69768,0x7ff845d697782⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1652,i,11954174428026407890,5926131287077547632,131072 /prefetch:22⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 --field-trial-handle=1652,i,11954174428026407890,5926131287077547632,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1652,i,11954174428026407890,5926131287077547632,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1652,i,11954174428026407890,5926131287077547632,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1652,i,11954174428026407890,5926131287077547632,131072 /prefetch:12⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 --field-trial-handle=1652,i,11954174428026407890,5926131287077547632,131072 /prefetch:82⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1652,i,11954174428026407890,5926131287077547632,131072 /prefetch:82⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD597083763a5487347cdd10c502182cc41
SHA1844d86eb7f614cc3582c255ef3de5aaa2563b823
SHA2569dbc78f21d5079c99932e84f14c7f0b98e4d0143951b2b255ea79e2ea39d3088
SHA5122aa2ae0d458736095643869560d47ad52a96b046f709c8de047125d45ad082fd88e7a1e45ae1eb8ae46e6c122335450e17892b5bb6b038d2baf179b0f081b53c
-
Filesize
707B
MD5894bedb291c73947c6a40c356a68741a
SHA125995fa566996ac0a5c32c3b2da41fea9da3fe2c
SHA256888315c914598a3c6b544e1a3ea18886160eaf42aebe55b3f2fe02e9dfa34640
SHA512a67c0b6c351debc50be3c7acc09b8e3b553706b9566eab88604c3fb8b3be1d3fb730a5e50ac677ca98215c5fc2468a1665b5ba378e5a364414292cdf42091db2
-
Filesize
6KB
MD534cfd7abd97dc475722961d6bd4f3a73
SHA1a3a031950ba733a8e72c4ac75a4cb77629cb94ac
SHA256b949ee5d43b8b38a596002ef45279689db59cc26cb96f1f978acb4be11cc139b
SHA51207568cdb31617b96a07002c0ed65d07be1b81bed43802bb9fa91332291e32f4e74381740b85a905b82dcfe944fbe16514b2371dbccc25f2ead3d884b220e85de
-
Filesize
114KB
MD56537e69679cc691bc5c2845ae40c9abb
SHA1a729ddd99b128392913d4d8b248e2fc633f9b135
SHA2561458b0ee010b3e3f5afa1acfddea31d5f9ea3d073359d23d611c4edc0c4585a1
SHA512e027a4e161c30b3d71263472fc5c1c242ee4a649956b9cab06cd4b64aab15f0171063f74ee5c59062da70d2d3779584ea1233a46490a5d0ab32801e81887c680
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd