Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 03:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://trk.nice.com/v/MDY5LUtWTS02NjYAAAGQ5RJbTyy3LzCU9j4JQ6x4bDUYvrgehq_i2sSlz7dClMvPlkOZ4dpfxrbbVS3to2risXPZ68w=
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://trk.nice.com/v/MDY5LUtWTS02NjYAAAGQ5RJbTyy3LzCU9j4JQ6x4bDUYvrgehq_i2sSlz7dClMvPlkOZ4dpfxrbbVS3to2risXPZ68w=
Resource
win10v2004-20231215-en
General
-
Target
https://trk.nice.com/v/MDY5LUtWTS02NjYAAAGQ5RJbTyy3LzCU9j4JQ6x4bDUYvrgehq_i2sSlz7dClMvPlkOZ4dpfxrbbVS3to2risXPZ68w=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133509710571298335" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2652 chrome.exe 2652 chrome.exe 2500 chrome.exe 2500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2652 chrome.exe 2652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 4148 2652 chrome.exe 84 PID 2652 wrote to memory of 4148 2652 chrome.exe 84 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 3692 2652 chrome.exe 90 PID 2652 wrote to memory of 1164 2652 chrome.exe 89 PID 2652 wrote to memory of 1164 2652 chrome.exe 89 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88 PID 2652 wrote to memory of 4064 2652 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://trk.nice.com/v/MDY5LUtWTS02NjYAAAGQ5RJbTyy3LzCU9j4JQ6x4bDUYvrgehq_i2sSlz7dClMvPlkOZ4dpfxrbbVS3to2risXPZ68w=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa26709758,0x7ffa26709768,0x7ffa267097782⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1944,i,14882468230278803063,550417495346048333,131072 /prefetch:12⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1944,i,14882468230278803063,550417495346048333,131072 /prefetch:12⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1952 --field-trial-handle=1944,i,14882468230278803063,550417495346048333,131072 /prefetch:82⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1772 --field-trial-handle=1944,i,14882468230278803063,550417495346048333,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1944,i,14882468230278803063,550417495346048333,131072 /prefetch:22⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1944,i,14882468230278803063,550417495346048333,131072 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1944,i,14882468230278803063,550417495346048333,131072 /prefetch:82⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5176 --field-trial-handle=1944,i,14882468230278803063,550417495346048333,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5d7510ece6d97aa1b39e7ece34530f2b0
SHA117ef40e5ce926035fc6573aecd8274602e5937c7
SHA256ada96a3b6e6edf680085e9c43d0fa67b5b739ed09327a2dfc22c686c30b53581
SHA512f90b806fe721a42e875dedad51b55d9746956bbc6ad545b9535c3b94118db12e584104cf4bca7f9458f080b211942aaab8ea51a4c83ea6fe805ac3f7369145d6
-
Filesize
1KB
MD52ebaab3ab1ce584d091cc03a2bd6d57b
SHA197804f072465a8fa83128a8e3210a67664caa518
SHA256e93af51b542c94cf83cecbbc47d5ff876905454873512918d0846303dbc97b47
SHA512b273741e294857a7b5e66bf012fc42a2af1adb25c8041a51f666bc65cd58d5d5e4d488d396b83fe0918ce7a65edd7a07fc403e87b88e5c4a27e1ffa566db8c60
-
Filesize
539B
MD5f8e0c1161d0c38f6f24a69eb07c0a7ce
SHA1455ba1ba8c960c93aa42af8c3e5092fec8f15e40
SHA256c0f8090414f0d263f1b45111b4275858e5c4b2e8d85c6100d597f22812b79f52
SHA5122761a3e8c333c78014ceeb92bf67963041abefa5bec75b17d8a0224e181bdd66d7cc0a3f93e805cac8413f21aa7bc97af6359bee3e7cbda9b6da89af57002b7a
-
Filesize
6KB
MD575a1dd87f548c91008e898952980174d
SHA121ade7d4c3cd6c145737f94be8893b74805f1749
SHA2568987c67687b6348f74288a2cd44fd5af1a2a75bb9ba63660aece5e0d3c093496
SHA51289348ab5a9a4b720f6bc2df7e16e7ca12cd4635d4ffb99f79cae179cce99048cbb6b2f0c996fd41b34e55513311b2100e59a4e4f08b155f188389fcab19b0297
-
Filesize
114KB
MD51035025d215dd2287b521588cfea96e1
SHA153551b33bdf66079f5908f5308b252a13219ddee
SHA256d1c7c432c21726d3efc69b0cb23226619478cce2256820f913ca98a3db7c861b
SHA512aef160c6454fed86856f51e26e965f5750482797772236d86bb938316d81fed19dd4567b57990ce4f55175ee9143f633576120162cd553ee972e7d031b7b3d63
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd