Analysis
-
max time kernel
1799s -
max time network
1686s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-01-2024 15:29
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506704785747430" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2848 chrome.exe 2848 chrome.exe 4520 chrome.exe 4520 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2848 chrome.exe 2848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe Token: SeShutdownPrivilege 2848 chrome.exe Token: SeCreatePagefilePrivilege 2848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe 2848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2848 wrote to memory of 2836 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 2836 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 408 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3008 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3008 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe PID 2848 wrote to memory of 3708 2848 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://andromeda.mbmail1.com/unsubscribe?b=oomx7zr0126gd509795ynl4v9qjpkwej&c=rrjp6e42k9ogz5ml0gr3ylm710wqdnvx&l=41p6zmk7ljw3ry04o02o5xveo2gdq9yr1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd77729758,0x7ffd77729768,0x7ffd777297782⤵PID:2836
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1468 --field-trial-handle=1808,i,10397866080277965102,9096140660856632731,131072 /prefetch:22⤵PID:408
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1808,i,10397866080277965102,9096140660856632731,131072 /prefetch:82⤵PID:3008
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1808,i,10397866080277965102,9096140660856632731,131072 /prefetch:82⤵PID:3708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1808,i,10397866080277965102,9096140660856632731,131072 /prefetch:12⤵PID:3916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1808,i,10397866080277965102,9096140660856632731,131072 /prefetch:12⤵PID:2840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1808,i,10397866080277965102,9096140660856632731,131072 /prefetch:82⤵PID:4448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1808,i,10397866080277965102,9096140660856632731,131072 /prefetch:82⤵PID:2160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3260 --field-trial-handle=1808,i,10397866080277965102,9096140660856632731,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
240B
MD59b7186da770b918537a916d6170feecf
SHA1bab32f50cec5f797cbf82e2df0371d775b944223
SHA25636876bcbc93e5374123e07ab3f3664db5abe03f8989839ffbcdddf76493c1c28
SHA51211cccceeaeceb7c010035e60ef03bbda55c7c3079ac1173dbe1c9694969d894d5b9ac3d52c94065d9a95b7ff6c27c10ba9599985857748d33bb8381e8e306199
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5febf91d3a00d6597bd8969c2e5bd4033
SHA1d57d44f4c221daf604b5a1b2b0f5297529e11ed4
SHA256e3ef99d8829e4e810aceba42f3b68afd2f04047359c725a2b348d0641d1ffac2
SHA5128c95716e1d9a4f3b561b1317edd23b4614fb69b8d521868ddd8f663aaa7412398c3f3c67fd9be6b89f26a5a3703729d42db33578a550193bd5ef8d1a33f47a57
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD51f62e2c5bc84caf5918f9c0faed39965
SHA1ca149a9c28397044b2099794cd9ea055266e6c2a
SHA256d2e5bdabb606e6046c2fdbc10a999db5f6443c830a4e876422d2f70c569db617
SHA5121a7bfe5f07b31f4b1727b56b30417047d3fbe2e44c179499858349bb9ab3ee62b1a6a55df2fb3d05bd4767480692cb23637832598c08d743592c0cdda42b92f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
706B
MD5b60b5fe70e15e50deff791ed16dafe17
SHA113c489fa3c7d614cf7e59c5813f0cca32c5b930f
SHA25619e9eb6ad78b3f1cdd59af808db8441ce83d2b7dd6afd1f6cc28cacf5bbfc1ca
SHA512395daf32cfd9d34a4c1031456e177b8dfabe934298c6bd8fe48caaf53b408762cb88db81a6b8082256618835ff0ca282b2804c5ee5545138f0eeb1c8f9239f3b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
706B
MD5bd969f3262f3037a836604418b8a237a
SHA12b03ea790f84d0367b3cc569bd05f9ac3822b515
SHA256f5948d247d4d81c86a1f4c38ef885cca5aab78b07a1f070f606834d33b585536
SHA51260935c354e7cd26610f60136f867269052392e6edfe1e1a05d1a056bbe45774752a531408c06211258d00ca897500712ff99a4b71f7030459087807b4a900774
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5f956aea82c65670f176c754aa7206739
SHA1978e4caac5683dd7ae1514ce4d23ddb29ab679be
SHA2563d9847985cbf9125093b741e6b3168cf9f63395b39a2047f86654e634c8227be
SHA512202009b2b4a86ef47ab09c74a78d647a22a14a9681561f1b4f20fab233ef8205fb0475dade71bd307f8d901a6102e4d972b02b64d42e48015571431968e76457
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD582e282bcdb3f90b7b6555b82b87f7704
SHA1f4363074313fc9cdbb25cf8cbb15f35be043842e
SHA2569a8a459b9ec9f35bd31d808676e160b1eb0143c7da4def88da3098a1c468c3b1
SHA512223e1540bdc2455b54496059215e9246af4524fa7c84325d914729825171962d20c2897933f8d011aab22929ff7a4481aab9a155d84f292ed61d1089bc2f1929
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2848_HEGMGXPSENEHQDXSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e