Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 19:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.openssl.org/~bodo/ssl-poodle.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://www.openssl.org/~bodo/ssl-poodle.pdf
Resource
win10v2004-20231215-en
General
-
Target
http://www.openssl.org/~bodo/ssl-poodle.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500792496425321" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 768 chrome.exe 768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 3556 3232 chrome.exe 85 PID 3232 wrote to memory of 3556 3232 chrome.exe 85 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 1048 3232 chrome.exe 91 PID 3232 wrote to memory of 5076 3232 chrome.exe 89 PID 3232 wrote to memory of 5076 3232 chrome.exe 89 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90 PID 3232 wrote to memory of 2876 3232 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.openssl.org/~bodo/ssl-poodle.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff053f9758,0x7fff053f9768,0x7fff053f97782⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1892 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:82⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:82⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:22⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:12⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4644 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4972 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3992 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3732 --field-trial-handle=2064,i,15413268291969396842,12994805211665679380,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD5c26b03cb606a7a31c2477a56007019a0
SHA1161150999d8f65077cd09b7a53c9b8715f32ad90
SHA256bcbe04df214532e2ee92ff39b40248fca7cd89e0ecd5673ec966fbe2d33a2f68
SHA512346223ca8a1db536b76f37887b0390a2bcb665608fb827d42c2b5885bc571932ca1ffcafe4ce0a23eaeff2469d29f73c8ba32d95eb70f2f637f1b30c65aba400
-
Filesize
538B
MD5eede55791980935626e0f303b248b9a6
SHA142bdf8b872d20c5d6550d53bf25a918173547307
SHA256b3ea0098afe52f7d4535e931696eccd4f9693979434f27fad4015d664af72133
SHA5127aa683c0277d3b24d1472e5e52302284d67201125ffe0c2f07e341459428d3b2b5c1f1bccd7cff8fa7c7b73de213c3562c0fa1aaf7592e6f7d3e8104dc2e6540
-
Filesize
6KB
MD5428848a52ef49d7a6354fa4ecf8d9f8b
SHA1597e167cca22a22a82f6dfcd8df575d97230d1f2
SHA2562b40512cde320acd7d3c661b89c166388b13c2c22f1d6d64d7619c870e97cddc
SHA5120d7dd8e2672e9a9525f1791da47871f47a0ce23228547b20719b7d9c04a1fe490a3ce4a66903105171f804b3672fdf1bb03f04ff706f5f78a6be9452152d9481
-
Filesize
116KB
MD5fc05150c76e4a8c9e2f62000187a1518
SHA148df59a12cdeb52a173ed4fd815f13883552864e
SHA2562860c760c14eb4b5bfd669cf0aaac51043be6a90b0bf20d9477ca7e7ff22c77a
SHA5124e60ad597293fb037eb62c517bfc1e09cc45a5e438cb24ffba3073111d186e144844062641a72dc530517d998997b8e8106adf81ff8a7db9a1254765658797f9
-
Filesize
115KB
MD5e9960e707a433656ec7b3027c256f987
SHA10f2f84998572402357d349d9bf1979fb36dbda0c
SHA2564ff6ba639acf3a60a82f8962e5f9ac19e6a105623ae97f1fc3e9c0886810b6b0
SHA5123c3eb792d97ee8691c98e42594a3b13d7a470a213bee812ff9600061bf328ded7a16b164ec5effa71739760630349cdd772cb97df8a14017fcfc27a1ea6c370e
-
Filesize
115KB
MD5722f96984a3b452bd8428ce264c81d78
SHA10d2367e813d2bf90a433fe143336fa0f7d0f5e84
SHA256140c9f707655c6f2f38b741e53f0fb31cecd888f0c67228fe2b17169721ab702
SHA512affa4efc4ce2133f079748f82487ce64be50085dfe1e474f21a10bb007384c559673136014f99da76d26821346cfe1a4a1925eda86d8fbb4a5aec78dd03791e2
-
Filesize
135KB
MD5120a1f9d16822bf539407cdad18b8fb7
SHA1dc217454c7e779d84ac7e7f855bac3d48c27b793
SHA2564adfc0805cd56b4a08357ba1f2e11ed889ee74dcf8fddc8610459a29c02bee0b
SHA512e902ad97e25d2e9425b9cab2841c92fdfac841631aa00a35346a1c95debcc31e1d2e51f6df7bdd631ad021b22aead9fa3d0436ad5a8fc0f1c41e57f9cd4b14d2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd