Analysis
-
max time kernel
1200s -
max time network
1169s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-02-2024 12:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://zx
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://zx
Resource
win11-20231215-en
General
-
Target
http://zx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133514385617575025" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe Token: SeShutdownPrivilege 1592 chrome.exe Token: SeCreatePagefilePrivilege 1592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe 1592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3788 1592 chrome.exe 71 PID 1592 wrote to memory of 3788 1592 chrome.exe 71 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 4920 1592 chrome.exe 80 PID 1592 wrote to memory of 3732 1592 chrome.exe 81 PID 1592 wrote to memory of 3732 1592 chrome.exe 81 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82 PID 1592 wrote to memory of 4960 1592 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://zx1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc26639758,0x7ffc26639768,0x7ffc266397782⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:22⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:82⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4392 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3148 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:82⤵PID:588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4360 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4748 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3556 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3584 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=748 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1440 --field-trial-handle=1820,i,17587921440230662200,17018164134814051290,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD57c5e89cc2f5814d456cdd7181557709b
SHA133589837dec02cec4350a6d0b32b4a4dc866b30a
SHA256d8f40182e05cea2187f5cca86f36dd807a686c5269548dac6e9fc5695b891be0
SHA5129069bf478395bdc8ed8eb9ae166d6be3eeb5a9ecaa90aafacd0674a025949cb2f8d171ba29e1d2a227762e985331b328e88af2fda9a8d2faa413839ca74c8b15
-
Filesize
6KB
MD5ed9fdc7e89983a4350b4bbb2b76af38b
SHA13e1c6dd3611e114910d9258ed281f33fdf658f74
SHA256fc4d19d2eea419241d0627a59a0cf0b8b24b6019e35cbfd2d7c6b437d4f6b40b
SHA512d14a8cca1cd6ef27ea6dfec6dc3c188a4a89a2c5aca7ccdae0bc31a49ea853a49c995c44e301c6aefcd5b9374765fa2734b66574a6e0c563849169dedb6ecb6b
-
Filesize
6KB
MD5c2a865bba696a889ee200a3bd5df06ef
SHA1760e449eec98031565108b76ff39f356184b191a
SHA256d620216892ced96f09e27c45dee9d5eb00437f369dde737883dc2511f683cf1a
SHA51275a4952386d7c5c40e53eddd33565214df7f062f08951356e83960eb2a34509a6ed855a74747a3d5e83f27542764a147e45545ac611d96144030c1bb52bf6c25
-
Filesize
114KB
MD5cc48a543f313a3d1e5c3183e2ba2f38c
SHA15e6b516363529651d4025223c2b89dc35ca06652
SHA256895bb4258d46ceb96ce165c792c856d03dfda7a0e0ee9311f81026012ea208d3
SHA512b30dc6c04920924f47dbb8954f5f287efd04dd74575aa637adec9f69534e38c7dd2f6a196f3f4a635d32be938dbcb38d97c4f8263b46cd2ea68994505b665f12
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd