Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-01-2024 13:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001BeBNstiyW_mmi-gtW1Lx5puDy-khCG2aBK-tCFwi0hDZ3tufaSxdv33h24Qx0-Wp3_Ppqk3-GmQDvm3ReUOUKWOXcFXQJ8h1T-1mW_7MxTeMx_ZV-E4Q5yfALNd7UIcGIoECJC9QsbBwIh7kOESVvSa5-R1jYDck&c=&ch==&__=/jjdjdioowowonnbnbnnnddd/jfjfikieieuurrbbbzbbzzsss/nnndndiwowwpwmmdhjdkwwenenee/gywhirpshtzohbwjetuhrurwfzxwzx/am9uLnN0b2tlc0BmaWRlc3NhLmNvbQ==
Resource
win11-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001BeBNstiyW_mmi-gtW1Lx5puDy-khCG2aBK-tCFwi0hDZ3tufaSxdv33h24Qx0-Wp3_Ppqk3-GmQDvm3ReUOUKWOXcFXQJ8h1T-1mW_7MxTeMx_ZV-E4Q5yfALNd7UIcGIoECJC9QsbBwIh7kOESVvSa5-R1jYDck&c=&ch==&__=/jjdjdioowowonnbnbnnnddd/jfjfikieieuurrbbbzbbzzsss/nnndndiwowwpwmmdhjdkwwenenee/gywhirpshtzohbwjetuhrurwfzxwzx/am9uLnN0b2tlc0BmaWRlc3NhLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133510068549216264" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe Token: SeShutdownPrivilege 4844 chrome.exe Token: SeCreatePagefilePrivilege 4844 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe 4844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3508 4844 chrome.exe 32 PID 4844 wrote to memory of 3508 4844 chrome.exe 32 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 940 4844 chrome.exe 82 PID 4844 wrote to memory of 3692 4844 chrome.exe 84 PID 4844 wrote to memory of 3692 4844 chrome.exe 84 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83 PID 4844 wrote to memory of 3940 4844 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001BeBNstiyW_mmi-gtW1Lx5puDy-khCG2aBK-tCFwi0hDZ3tufaSxdv33h24Qx0-Wp3_Ppqk3-GmQDvm3ReUOUKWOXcFXQJ8h1T-1mW_7MxTeMx_ZV-E4Q5yfALNd7UIcGIoECJC9QsbBwIh7kOESVvSa5-R1jYDck&c=&ch==&__=/jjdjdioowowonnbnbnnnddd/jfjfikieieuurrbbbzbbzzsss/nnndndiwowwpwmmdhjdkwwenenee/gywhirpshtzohbwjetuhrurwfzxwzx/am9uLnN0b2tlc0BmaWRlc3NhLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe29969758,0x7ffe29969768,0x7ffe299697782⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:22⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2140 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:82⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:82⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:12⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:12⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4576 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:12⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4892 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3276 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:82⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3728 --field-trial-handle=1840,i,6870360090222138042,4050915828422479080,131072 /prefetch:82⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD528f685d74c2e4f790d87e6399fe099d1
SHA1bc249dac893aed3770501d4b9335c5da9d29733e
SHA256527582c41679fae8d2c6fc5ec71c6406d9e531a5358d710c7284ba429db6ce4b
SHA51254df61ff2d4a26d15b1adf19d9869be46b37a953e6ddfbe0ee479040f57ad7fa33c5fec22eea58eeeb32b7aebf1c977494bdbe542ef2dd07a313ddee1e04714a
-
Filesize
6KB
MD5801abab79b122585f949667940e5ee60
SHA1d1d408fff0ada1bce78affac823d5371331e24fa
SHA25644b019b02adca5bec3dc58c93c97645f7bd9f4b8a559b9297f67a08b6819f358
SHA512e177ff47d0701124854c51eea2c2ae2214810dc8309218286c60bbb0f87943db476f47bd87df417f6e7b510cb17465bd69522ec13889b373f3a4c8305b809971
-
Filesize
114KB
MD58e783667710d1fa3aedc1acaeae8d089
SHA163af4a60e7937d90b5190c09d89dafe4e5ad0379
SHA25695ede902574ac21092593577315271df18c1070d95675105db68f31b6175b159
SHA512b700df817153f0cd7a02691a905b64e23f2fe8eeaaa0f706f3d87934c31f7b94a0abb1ca25742b318ee3a2b68fa81b9f72c060c4c6e626ff70e6098563ba08a4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd