Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 07:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://loinkedin.com
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
http://loinkedin.com
Resource
win10v2004-20231222-en
General
-
Target
http://loinkedin.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133509859510760418" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5816 chrome.exe 5816 chrome.exe 4484 chrome.exe 4484 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe Token: SeShutdownPrivilege 5816 chrome.exe Token: SeCreatePagefilePrivilege 5816 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe 5816 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5816 wrote to memory of 3584 5816 chrome.exe 16 PID 5816 wrote to memory of 3584 5816 chrome.exe 16 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4832 5816 chrome.exe 25 PID 5816 wrote to memory of 4936 5816 chrome.exe 30 PID 5816 wrote to memory of 4936 5816 chrome.exe 30 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29 PID 5816 wrote to memory of 220 5816 chrome.exe 29
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://loinkedin.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1e199758,0x7ffa1e199768,0x7ffa1e1997782⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:22⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:12⤵PID:6132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4592 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:82⤵PID:6020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:82⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2808 --field-trial-handle=1904,i,11573813810321271374,8003180557243018568,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD54d04850485027fae92e57c883db52878
SHA1b87d4852b48ed314c4e12e3971662b669ac7387f
SHA2562d645b19e8b98fff48dd3a4070192252069db92f9076a3c1b4cab731ded4c086
SHA512e37108fa788e673416c304fd8eae3a91a4437f689211811b7c452e8531929205620fe7f8d27fa71b3a10502cd1b720671ab61b59e59dbcea5d5e54c2ff9cdc48
-
Filesize
1KB
MD582e60fd90cc010608a40420a99d6d63f
SHA13a4729fa3bd7836ac645a3ebcc02b6afd39e1ad4
SHA2565021eed8faef9f2e37b24a075037aa94c9fda7b2e5c2c77c895d4a9224277340
SHA5121ad43adc070dcd71ebd409d94e2f45541d6d1d937a01770807f7a2d582e4335a72a84c53e759639d29f36397495825afc2d5a9f086e5d8e38467ebc0d4e309ec
-
Filesize
6KB
MD5a2ddb3198ed550e58a922c74eb4abf58
SHA1df5e4ced5e82c428918f9f855d6208a42f184150
SHA256c130a37a65ff080be89a4ec21daa2725fe828a5b6d04b83e991b49b91fcefe08
SHA5122418b37a540e5d0f2d6ea0ad9dfe25847f22c162a624fe071d36fadeeea0b11cda8280baa50a728dc72604c4f28ab92531ada47da162c259465ef9c27a07a126
-
Filesize
114KB
MD512548601681939b3424d7dfa5565d977
SHA15cc85ea0e323e040c31edc2e8a393b757025c7b1
SHA256f69de442fd35263f4b01c471c7fc42fe934a7e7eb3b4d500e1a148ec8c4c5513
SHA512d4a7da7ae5332e88f8e49f3b08c4e78cf865e18a7c8b8a44f845e6234c38834b95b475f828920dfc9419232aaa8f6d7e13686e479563a730b4574897b6cd392c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd