Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 20:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qr.fm/hkKF20
Resource
win10v2004-20231215-en
General
-
Target
https://qr.fm/hkKF20
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504291831379722" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1428 chrome.exe 1428 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1428 chrome.exe 1428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe Token: SeShutdownPrivilege 1428 chrome.exe Token: SeCreatePagefilePrivilege 1428 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe 1428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4044 1428 chrome.exe 84 PID 1428 wrote to memory of 4044 1428 chrome.exe 84 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 2008 1428 chrome.exe 88 PID 1428 wrote to memory of 1840 1428 chrome.exe 89 PID 1428 wrote to memory of 1840 1428 chrome.exe 89 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90 PID 1428 wrote to memory of 1852 1428 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://qr.fm/hkKF201⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0b369758,0x7ffe0b369768,0x7ffe0b3697782⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1860,i,14377551873630797936,17999266799930423257,131072 /prefetch:22⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1860,i,14377551873630797936,17999266799930423257,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1860,i,14377551873630797936,17999266799930423257,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1860,i,14377551873630797936,17999266799930423257,131072 /prefetch:12⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1860,i,14377551873630797936,17999266799930423257,131072 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1860,i,14377551873630797936,17999266799930423257,131072 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1860,i,14377551873630797936,17999266799930423257,131072 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD50f6f2d87e05123f1e553d3712ef62941
SHA193d7ea6af675fe872e710bfdcb0df6b6b477fc2e
SHA256edeb115d94ecff8bb929e482a2e2760b69f8b138651a003d87a501ec2ebf6645
SHA5125c26bfa448c93c0c92b75f9113837c900e18055605e438ef387e5cb0bd14099c252e507f4a14a5f3cc98be4e1db6432a100a12ca9fda64fffc5bc49f5979206f
-
Filesize
537B
MD5b902aa027ff171fc19a73cdd1e412da8
SHA1383809a31be6d0a3b46185110079d165bfd2d441
SHA256ded35a4eff43982c0b0aab0c1fb1324cdea6aa0627a248e7b20abe88af1cc706
SHA512b499864c489dd546cb275283b11b2b057fbb100e0f108aa8916391aced36517797ae5a9ec4f277c81b3766b63b9ab424f1ec3efd8822e5323a8991c5a1c05c03
-
Filesize
5KB
MD556c6a91c2270b7100d59f1d2050a0980
SHA12dd10dfb4c1e9f93d97fc26a05943974bce53507
SHA2567b9a447419673d02d55141e328a1f59279bd0f5b8f3e94a434ec0e985bf48186
SHA5126d39de0182fe9987600d26b0a6aad28fda49346999bd01b18962c3ddd880bf5f47fe8c3c625cf8e8970f3a5197024e025b3d0f1e62b5f1797ce8f52c97a0d2c2
-
Filesize
6KB
MD53412f0bade734b005e9df71dd4b8b52e
SHA131caac25cc812934ddb23348ff4a19e00483892d
SHA256ae6805c8f637354e4491b9feac56146e2c9698355f079fe239a4cae616418b5b
SHA512c1d10bb09198261d68aa92854fb99f3b05396a27d2e722bce178d0002c5840433006ef00638e0aa41b49b32f882cf8b52e402dcc01024cc9eb89c33b60292741
-
Filesize
114KB
MD53a4d8b3b14e6bb5e3895a7d265f71e2c
SHA168d675278dc4c65619699a52891e7718e23c62dc
SHA256a10aaede67893d82cf4b85a5bc116fa38f32ae4ad07c053e3e6f16051d08a1b9
SHA512b16ada02a77c7a72c5cc7991b01359859a740baa78b8c1dc700c400623daa400bcf8d4976bad146d982e5f4f731b86647dfb4b9fa1fe9c374e79dcbbb8e2b32a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd