Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 22:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://surveynuts.com/v/a1aa5eb9
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://surveynuts.com/v/a1aa5eb9
Resource
win10v2004-20231215-en
General
-
Target
https://surveynuts.com/v/a1aa5eb9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506082412428113" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3396 4684 chrome.exe 81 PID 4684 wrote to memory of 3396 4684 chrome.exe 81 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 396 4684 chrome.exe 88 PID 4684 wrote to memory of 3592 4684 chrome.exe 89 PID 4684 wrote to memory of 3592 4684 chrome.exe 89 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90 PID 4684 wrote to memory of 452 4684 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://surveynuts.com/v/a1aa5eb91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcadd29758,0x7ffcadd29768,0x7ffcadd297782⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1836,i,5179535643619304997,5464280251140911890,131072 /prefetch:22⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1836,i,5179535643619304997,5464280251140911890,131072 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1836,i,5179535643619304997,5464280251140911890,131072 /prefetch:82⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2832 --field-trial-handle=1836,i,5179535643619304997,5464280251140911890,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1836,i,5179535643619304997,5464280251140911890,131072 /prefetch:12⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1836,i,5179535643619304997,5464280251140911890,131072 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1836,i,5179535643619304997,5464280251140911890,131072 /prefetch:82⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2544 --field-trial-handle=1836,i,5179535643619304997,5464280251140911890,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5e7b548ecbdbb1a2cf51c2e847f2c70d4
SHA183b546e384e6da4a5f6bf53124f406f02fa8393b
SHA256a47ee4ae549afdbcc79e36be76b48d17e244ef49801908f32229bd286bd2c6ed
SHA512189b44eb0179a2b57986e171fba5cda9a91fb6c719389bcb3eaf6c53dc64709332eb10d6c8ca28f9f3cbe36778f168cc8769b00cfc5ae3945f6a26d9dfdabd4e
-
Filesize
2KB
MD56ab308152fde79d5c667425c36c7ba2e
SHA1d3ae0f1959a0723ce9ce4d7a344b7f2ee8d207bf
SHA256cc3c004dd9dff30dd865e59e1c7c5bb619256230726bb1110ae26de39b626584
SHA5120c90fd2d188d33319377eb885852cfc71b7c343d99404c306d2f04f19188349ee00ba262402450302dd9d8b0dd5629ffa0932588b15303c5faa6587449a982ba
-
Filesize
2KB
MD5eb2a4b928cd43862a5936cce9bbe7409
SHA137014fb34264af9c8433b3c0b3259dc601b470bf
SHA256dcc929fdcfef6fe463600c3181a416255862fc8f2a7194ccc146e961d078e25d
SHA5123a1b05ad18fe38c0e49af61b7853cb460075d9c96adbcf390ca9cdaf6d9a7d88ef0e3727dedc7c4e13677fe25792e3698cdcd4c22d93a88305e5384c80934ca6
-
Filesize
874B
MD5fd8d322f13d87328323b1d566f0ef888
SHA1fa33e7d522a1b629c3286fc1b16455a8991ce11a
SHA2562be7632de9ddc8c5fd8a5bff648280b550269fd24c190f7c1d1dffb3d7b7da8e
SHA512fc0d3baf4917f14ba9741e44868d408d994492ccadfed56709def570c12deb2888d6c19c03137743123ab99d5c42a979b25edb44323fa12f55f63c95d652fc32
-
Filesize
6KB
MD58093a917a7163e1662a2edaeddca13d7
SHA130627ce18316fd10e2f44031e5bd52bd2e394522
SHA25632486d9384d31c0f53a364e2a0af834d571a0ae69cb1c9e8ba4816b0985d8663
SHA5122f4321cc5f0a894f35864f2b813d0f6cdf20131c3cfffc35809fbd95264bb883a596947fea129c883b6b2147f91258c2bf44febd8720e0de93ecceb36adc1492
-
Filesize
114KB
MD5813ec77d1dca02a3677d31f3a7f86659
SHA1cf1646aefe473bc6cc3966367589c88253484000
SHA2567cfb8633987085b82805925046eb26472b5b9cdbda2fa1f531d3a672e3491e92
SHA5129a572f1738b51f11de1028f8e74bcd6d0be5face25feac5e092b344d912001456fbeba661bb0b7de54532acfc14c4f0e61bcd6dc36d1ae805eb2cb627142b735
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd