Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 20:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ci3.googleusercontent.com/mail-sig/AIorK4yQAv8zovrGW_BPMAOVUPSLcyiRkY9_UGkXmhQ7sYJA7bf3yqFNbfbf1A-k5nH9Sd9Dy0arKMk
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://ci3.googleusercontent.com/mail-sig/AIorK4yQAv8zovrGW_BPMAOVUPSLcyiRkY9_UGkXmhQ7sYJA7bf3yqFNbfbf1A-k5nH9Sd9Dy0arKMk
Resource
win10v2004-20231215-en
General
-
Target
https://ci3.googleusercontent.com/mail-sig/AIorK4yQAv8zovrGW_BPMAOVUPSLcyiRkY9_UGkXmhQ7sYJA7bf3yqFNbfbf1A-k5nH9Sd9Dy0arKMk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133507739041820552" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 736 chrome.exe 736 chrome.exe 4008 chrome.exe 4008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 736 chrome.exe 736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe Token: SeShutdownPrivilege 736 chrome.exe Token: SeCreatePagefilePrivilege 736 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe 736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 3460 736 chrome.exe 84 PID 736 wrote to memory of 3460 736 chrome.exe 84 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 1196 736 chrome.exe 86 PID 736 wrote to memory of 4924 736 chrome.exe 87 PID 736 wrote to memory of 4924 736 chrome.exe 87 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88 PID 736 wrote to memory of 2000 736 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ci3.googleusercontent.com/mail-sig/AIorK4yQAv8zovrGW_BPMAOVUPSLcyiRkY9_UGkXmhQ7sYJA7bf3yqFNbfbf1A-k5nH9Sd9Dy0arKMk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0e699758,0x7ffb0e699768,0x7ffb0e6997782⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1876,i,2369096604106476735,163139248528619309,131072 /prefetch:22⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1876,i,2369096604106476735,163139248528619309,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1876,i,2369096604106476735,163139248528619309,131072 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1876,i,2369096604106476735,163139248528619309,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1876,i,2369096604106476735,163139248528619309,131072 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1876,i,2369096604106476735,163139248528619309,131072 /prefetch:82⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1876,i,2369096604106476735,163139248528619309,131072 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2848 --field-trial-handle=1876,i,2369096604106476735,163139248528619309,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861B
MD5f7fbb43a1eb4c321f887e870267f67c6
SHA160d7886627956cc0a42a68546669e5adba333c99
SHA256761ae836f13145dd47820f32bfecfe47a8aedb63cdc27db730f1b18f74fb8bdf
SHA512a411cb0147804f135dab6eccde3b71495f2ff5caeaa45cdddef3dbdabd8dbb194459a31228c911b7166329618d2cf609c6e4303b2020533259e6dffa0e578124
-
Filesize
6KB
MD5c0ad294c606db3383aeb9beb9056fcac
SHA1e96c887e002a7a2da3e2a1ecfd69cf32228566d7
SHA256e7b118398f7f2103627063df2112b3321697dbe0e13b763de7cc9891b54a3e57
SHA5120e3693fa2ed9a29bd313a438f4eafb0ed824315991f2acadc269eda8bf29ca636c25e397e1442f016236387724bba02b85f8f597619821994e7d2b91084b8d99
-
Filesize
6KB
MD5e1f78481f368edf300e95cedf2097410
SHA160fd400422e261e244bf4f9d2a28bb6fbd5877e9
SHA25606b2cd597e4194281d7e0367d0d1b24b24d1a8c6705d18fed4bcf8c00c015c7b
SHA512da5ac8d5db0e0fc4027046987785b43bc59704dbf79c934641009d00d766dad89d9593c4d8ff56e3b16ca838d09221702465ca867dce811452cf944f03413723
-
Filesize
6KB
MD59b2b4f8a73c100be52b9fd9ec2ae7ab1
SHA1f439bbdb7a566ab2915e9e33fc14ea7d75615a6b
SHA2563f92665509cf25e14c0611380f32db83b6ea334d5e21791f2b4401d5582df6fd
SHA512addd1ed45aa82bf9ed9c8aee60fa327f0f3f336f1c6edecf448ef010e03d8e6e11480094981a43ce6d81b180a87780bb1186113b30e91444bd267e6eef8349fb
-
Filesize
114KB
MD5e839c40da915d411f45ca6888b957508
SHA1dfbd3a30c7920597e2298ca9ae90e1dc8878a6b1
SHA2561ace4fa8e4dd0dfe6866566b5d259f12aeff51b03fa4df6d808a5528ea07f0d4
SHA5127acee2ba498a580adbdedbc87dca9d13bbf6d21adc972307d348b368edb7266f7db2f4aafa3cb2bf4bb55e64bda366c1d308575c3ad5e2acecbf22841c9b3c43
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd