Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 10:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://snippet.tldw.me
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://snippet.tldw.me
Resource
win10v2004-20231222-en
General
-
Target
http://snippet.tldw.me
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133507388349260733" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe 1936 chrome.exe 1936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe Token: SeShutdownPrivilege 2268 chrome.exe Token: SeCreatePagefilePrivilege 2268 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe 2268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 3256 2268 chrome.exe 75 PID 2268 wrote to memory of 3256 2268 chrome.exe 75 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 2600 2268 chrome.exe 89 PID 2268 wrote to memory of 3520 2268 chrome.exe 93 PID 2268 wrote to memory of 3520 2268 chrome.exe 93 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90 PID 2268 wrote to memory of 3412 2268 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://snippet.tldw.me1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8d5b59758,0x7ff8d5b59768,0x7ff8d5b597782⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1844,i,2343208704878647015,2444321729138375394,131072 /prefetch:22⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1844,i,2343208704878647015,2444321729138375394,131072 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1844,i,2343208704878647015,2444321729138375394,131072 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1844,i,2343208704878647015,2444321729138375394,131072 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1844,i,2343208704878647015,2444321729138375394,131072 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1844,i,2343208704878647015,2444321729138375394,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1844,i,2343208704878647015,2444321729138375394,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2820 --field-trial-handle=1844,i,2343208704878647015,2444321729138375394,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD52a57ceb54f505db5a56c993cab97e73c
SHA1e0c5eca319271b68d5e47de0f8d7b3334ee5e4df
SHA2568a97f52594947a7d843ea114b69a21c45f36ff9ad39725620d0f1882a88023c2
SHA5123c4227b04f26734396ccaba74b9dfe67ba76fc03710e0b500ea31eef00ad4c5c151075785e2319626d518df66d4aa33e4248afbf6f39f4902fda75c0a07ac6b4
-
Filesize
6KB
MD5fde5d4bb56cb1b664dd7c9ebfd9623b7
SHA186a9bed95c82bd2ffff24db3282ff21fc3388ff5
SHA256d4eb7ecdd50dce11bcb4c04a1ed2d6c00a7a530f7abbbd814dc24b77839f5a65
SHA5126b9a38603dda6a8dcc572e9c2952f17b4e274dc267b9311fda99d4d43584d5fbd66f7624125cfcd98b0c88a7062096ea01f16c0508b0477884f1bbaff65924b2
-
Filesize
114KB
MD58aa34ebb75aaa54bb926f4a8cdeb21ac
SHA11d86acae55049105256744f9a76cd9955f42ce36
SHA25663b5a62701f9600243520065cdd4034378f397b09076f26563d8785196d23931
SHA51248d8c46d84cce08ca6b01d8fd852f9194fbdf7118c07d0d52faeab3d055e9b135030c2c763a3b4aa6e0d8a57351c29e08ac522d4805f56fd7976031d4fadaf5a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd