Analysis
-
max time kernel
1799s -
max time network
1684s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
25-01-2024 15:54
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506723403548367" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
chrome.exechrome.exepid process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 4596 chrome.exe 4596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3472 chrome.exe 3472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3472 wrote to memory of 508 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 508 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3352 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3416 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 3416 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe PID 3472 wrote to memory of 2080 3472 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.syntax.eco/games1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd1a8e9758,0x7ffd1a8e9768,0x7ffd1a8e97782⤵PID:508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1756,i,13348267365047194703,845755846390882275,131072 /prefetch:12⤵PID:1124
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1756,i,13348267365047194703,845755846390882275,131072 /prefetch:12⤵PID:596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1756,i,13348267365047194703,845755846390882275,131072 /prefetch:82⤵PID:2080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 --field-trial-handle=1756,i,13348267365047194703,845755846390882275,131072 /prefetch:82⤵PID:3416
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1756,i,13348267365047194703,845755846390882275,131072 /prefetch:22⤵PID:3352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1756,i,13348267365047194703,845755846390882275,131072 /prefetch:82⤵PID:8
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3868 --field-trial-handle=1756,i,13348267365047194703,845755846390882275,131072 /prefetch:82⤵PID:1292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3892 --field-trial-handle=1756,i,13348267365047194703,845755846390882275,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD56f56ebfd00a3e199db2d99cc5f810632
SHA1d7ca1b6b06d0da456125159086d55aeb039eef3c
SHA2566c0dd3a41615e071e7b04724a6562a74e8a0de5ecb5cd3908292481ac05a5a6f
SHA512dc3c8cf33ce5631d7dc601b55e69aa75b96543f3e1657efb5aed85c911c12832a0fbbb1306e67bc6552633a30fd03c483ac8d1a6d9417bb040c352a06d177df4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5f293cb13e0bd731ce5a5193beb074f97
SHA16a5b71c5f8364045d4d226281a508f3ccb30ed17
SHA256631f3eaf1d6a6cd2449baed7efa3e0cc37237d945b7251119d014eedc9e0d6c3
SHA5129838bfd225112a73eff3de14ea02c406b637824f862f07f2a3e1f29ef431c08a0ccc4cfe3a990f65c81e7aa72b1fa436e80cdbfe6deae769db8bec9fd37debcb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5a83778060bff1790e15af559b6663480
SHA1d4ad340647a54a733993dfe49ab0d3daecc1c265
SHA2565b6744a71359adb9a8801ff13bd174e43cfde66419996f1ce7e1a4a90bb35a57
SHA512d2c7e56a25a3ea27fb1b2b7f10511bc08e41a991e6b474ee96a21476649c3eee42aacb2b7689bddb51e3b23aeccf5ec828f31a2debe0dd6d785ecc4df563ee49
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
705B
MD551e5fe8932353f276cc8d903d5130ec6
SHA1ecdc087ebe60ec6dbb4af800a8aebce7f1863a15
SHA2567e0a3f1723e9696da058c907f47fc45411c5f30bb3bd22eafd411a231df6d85a
SHA512d9700689321f6a6ba5ffc376f550c6d375720adfbe77b08a72e11250b75b6322d85465eb1d7c4c49b98b02b6e59dd76bb0b78b32c4f7c31f12b28f887a150e3e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD54f6436d36e1286e054b354674a8b7a98
SHA1652f889492bd2ac3f4c6dc1d3c0698e0b7ec7a28
SHA256f6899d840f56e8e08f74762d3f1868f9d2f980b493d0bec77460479c85ad2e74
SHA5128d925e18141da99960b5bae348200d0ad8c0e30ec38eeb4b5d55bb71c867b0385cfc3bc0a74c49bf544c61275f0504b1874afcb94d0a8fa70a49c1c0eb6aa4e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50b5bd11d3534f093f8bdd7083ee63dcc
SHA1e5a273b9afc9f4661e6ab483de62feadbe96ab94
SHA256586e03cbb8cceb5f78c9486cc43d9f4e6d0ed97afcd1f5fa5e56fc88f6b36c43
SHA51212d2f5fa73e5409eff82b19dd32f79a68ef1c152480a3d83e012e871252f469fe67c0ae990f9a1048ea895d847fd56045665aad4879ddaf83ed79cbe5c70f058
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5c767539350ab71c1c506a2af98204f03
SHA1eded97a0768500028a2d23dacd7d060d6b0df0a5
SHA2569b2ae16628ceef78c71fe784a1be1049c83be8ccefded95300344ae2e191569a
SHA51210032a8b29b144fb7c677fe98cc4334b8fa7fdfd2eaedd6367f95a95da0630c619bb6b04055f770cb95cda927bb1fe307401f4b8ef4017a859e4991ddddc50b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD5d594985f06c7dedec23bb3c905a1d757
SHA12f9650656761e96993610f1fd06eb24d69ae2300
SHA2561544716c854c4f86e36803560e7469278d0cbcbc3742d670320cdcf181e252b7
SHA512935701795826ab9eec4830efb3fa2eff80123cce35d794923208a9877d7ef0e213127ea581321eca3e90131df41b1edca7f3ec9bb1dd0aad3c9e5f164fb3b33c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3472_ZUEEYLOKZVJVGBUMMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e