Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 20:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001iLfELtl_UNwhmQzH1YMtJB1d_lAaGuZ3Z5rHxscTCmYRsLW4jLLoLJfXL6qjBebmUgXEAWYv8rOwiEHCuCp3gIiRnoiWlOsbV1kHzi1SLfmlhHwsaYSFgKScY_qKo7WMl9fiSH17XnPu_oJfzxKqrQ==&c=&ch=
Resource
win10v2004-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001iLfELtl_UNwhmQzH1YMtJB1d_lAaGuZ3Z5rHxscTCmYRsLW4jLLoLJfXL6qjBebmUgXEAWYv8rOwiEHCuCp3gIiRnoiWlOsbV1kHzi1SLfmlhHwsaYSFgKScY_qKo7WMl9fiSH17XnPu_oJfzxKqrQ==&c=&ch=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133500842735914369" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3272 chrome.exe 3272 chrome.exe 1060 chrome.exe 1060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe Token: SeShutdownPrivilege 3272 chrome.exe Token: SeCreatePagefilePrivilege 3272 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3272 wrote to memory of 3024 3272 chrome.exe 34 PID 3272 wrote to memory of 3024 3272 chrome.exe 34 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 2592 3272 chrome.exe 88 PID 3272 wrote to memory of 3364 3272 chrome.exe 89 PID 3272 wrote to memory of 3364 3272 chrome.exe 89 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90 PID 3272 wrote to memory of 4576 3272 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001iLfELtl_UNwhmQzH1YMtJB1d_lAaGuZ3Z5rHxscTCmYRsLW4jLLoLJfXL6qjBebmUgXEAWYv8rOwiEHCuCp3gIiRnoiWlOsbV1kHzi1SLfmlhHwsaYSFgKScY_qKo7WMl9fiSH17XnPu_oJfzxKqrQ==&c=&ch=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc8f9758,0x7ffcfc8f9768,0x7ffcfc8f97782⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:22⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:12⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4760 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2804 --field-trial-handle=1876,i,6800138943834610833,137334974428167331,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5e48dbdcd222c6725f1bcd486d487a300
SHA1428c823f889dbb53e26ea3edf2599e35f2b5ca1c
SHA25689a2315c2aeee97345336ca4691c346a83b029c42419efb579fb3f442d087b0f
SHA512beb511b27ee0120aeb007c975753ad28383dd1bd8dd9e7728c459fdd28207b9d548c991380ab3dd8886483df737337de11ef1c306826c8db8666050d0f338537
-
Filesize
1KB
MD51289ef326081804c3e91239f03d0b0a6
SHA1f94b98b6f4295e9adf2efd065001d978783c2a13
SHA2560e6d499806af79dda707c9b87f1d2b3ec431936cacbacd2fd4568d056a2a6de8
SHA51239d221ddc90e0df9bb69d02f0c24af80432061cb88397e98ac76c3bb4eedb1f220869fb1d35ee1d6557e64d550e7aabf4fb62e71d7494f37767ad33eed296423
-
Filesize
873B
MD5b2744b17546533666f8349202bae85bb
SHA1e36fdc769d48782d217f4ae7a5dabe738f76a374
SHA2566fb24865f4529c7dd036927cfc669de2641ac040970a3d0a0106f27425c8a3ed
SHA512ba3edb05216aaa387702a867fdc2b66d3b7a5da1cdb540bc376b459b10eeda058c260dc87650aae0fffd80ff8384f29ee5b5f51a47a639e532ce2d25f2d36f58
-
Filesize
6KB
MD5d03bb053bcf007fb39010dd4340c18cf
SHA12c3bf8e850f71b8f30626e75ab397bedbbb25b45
SHA2564cdcbb374d03156c4ac45f8e2ebfaab65f22ab8aed47b8bcd5d034b247de1f84
SHA512c73cc7d6276361ebad45fe1ef91b96e5c09dfd3f0fea253c9165dcecaa631d7ed089ba11028aa0f55a5156e870b9276e8cc8f341297928f6aad6e1c8b52c7195
-
Filesize
6KB
MD5005d9a82af05af1f6ae439f457e4cef6
SHA1e1695e9161d3a5320f6fa6dc4fe1fd8938aaa1ff
SHA256c788f11aecc5eb6739312a374a838390f87104bd4f9115df2e6b22c9cbfeface
SHA512bfa706f18bdd90e7136e4918e91e523ec4783d93d87668a317d51bc80f4596d37199fa5c868eef3128c7f9027cfde28c63f6a72d299e484ed138fd931357e5d4
-
Filesize
114KB
MD5c1b089228229b18ad9b95e14be4e5cc3
SHA1c639c5b5ca3dbdd7bb6cb637843891c88464e7c8
SHA256500ec7082e991832f673cdaa7d3338e9faccbb082b414f4fc514bbc76bc2527b
SHA512aabf5a0eb6fac7e07ffbc4bd044ddd2d2c0d56ce06ebd844d0ba14a295ca8e94a543d44b3af87875ee27e6304020386fa085e221a5115dee497abd00ffce84fc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd