Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 18:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://google.com
Resource
win10v2004-20231222-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133515484783282857" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1140 chrome.exe 1140 chrome.exe 4076 chrome.exe 4076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 3956 1140 chrome.exe 22 PID 1140 wrote to memory of 3956 1140 chrome.exe 22 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 184 1140 chrome.exe 91 PID 1140 wrote to memory of 2968 1140 chrome.exe 92 PID 1140 wrote to memory of 2968 1140 chrome.exe 92 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95 PID 1140 wrote to memory of 4664 1140 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa59809758,0x7ffa59809768,0x7ffa598097782⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:22⤵PID:184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:12⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:12⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4572 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:82⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:82⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2484 --field-trial-handle=1892,i,7571545698193859292,14651542477998159780,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD54a7fe295dabfe354dd6e24cdd54975b9
SHA16041b2958de04f0dd261394af779ec2620618413
SHA2566a666af2dbdff8d7b8dd7cd443b96e0471fbd9e872487b9eba9ce7fbc47384e2
SHA512a63a634d43832953492bb0b478f3f90a91817145cf708f3a9938e51f3a8201a8e6b0d1645f5560c98f2361b6becd30e9bacb7a78cbd9fe4c46f2fa39ea1710a4
-
Filesize
2KB
MD5993c169fefd0005ae810754c21c16419
SHA167acffec1167ecfbc9f0eb9f13ce0d3db820cf19
SHA2562246d0560ba9a8863b467d9bae1a6471970bc5e949e57006477cd8d45db0df35
SHA512205241819e3bdbaeedb6cfd523748521f0e7c90e819bb6b59ef74f83af36d6adbab49fbb65c8093ee97ab80690ccd6cdfc10302b5ee2e2421d2659f96108fbe5
-
Filesize
1KB
MD5a68cfae8c7f866cf92000f4da9e90eac
SHA1256e17b742554cf59cf92f90052f93e6ab311c44
SHA256852a6f98eecf9f5e80c87562c377240d2bab8fdc826b147b9b8fba02273c52ce
SHA512f6764bb770eafd2aee6bee6e447f965077ce0f2b5838ab9857d919e9ed390a83a2f1841bb645cb5e17c47b02c48f95ff0493337e2d779ce15de308002d2d9997
-
Filesize
371B
MD5b0b6a089c499339674f6fea5e9a3a8dd
SHA1fd0a51fd13268d69dd220199018802e68b8bbe46
SHA2565505278addf26598889f70717bafbafdda95567e22c952104ff85f583a34d10a
SHA51258a0da7e3a03049a0300c5456fdec33f525b8b92cbce2886f8d4d2243115f5286332f8e023c6a49939a3e68c4a8ff75451d03316cbb72b6822d13279836a5225
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\bd721c4b-d1b9-4b95-ae0c-e8576b7c093c.tmp
Filesize1KB
MD57b760e85db2faa2c081a88d8c19f6947
SHA18d7cf27f09095d83adc0905c65a632c8511f871b
SHA25696dc754114af0d56fb8e03a2860613c7f428bafa856a73bb093a157da75dba48
SHA51271e1121b8f2be71132e8dd3c45900e73868b2ff279fbb15de410945fc7463bb8f7bab69ca01d644c84ba8eebe1922fd7c518981b68e2d4f1f274f387c05ceb53
-
Filesize
6KB
MD57633ba3140ac73f248ba28557c2f129c
SHA1cedad968b7bd43f9834743488fd08d7faa103b43
SHA256eef15985ba8a8fa1537cf66c0acc936c9f0ffde4c33abefbb1359bc7692613c0
SHA51271e11d86004732cb41ea1650a58a16613fc6de6c3d040950691f0ac83f2184f403dd673e3250a6e47c5399714be99d75146f324fc26f82880cf9055957a0dc0d
-
Filesize
114KB
MD5f675a10d0784cc4fda11eccfd3198704
SHA113a930b7331ad86dd1e10383ce551417eae129c0
SHA2568b94448af8de3747a6200b892bad068949a83e906ca0ef051e16e3ad91bb25f0
SHA5128f4826ba917488d6e52a444c70a63d4c7511b6ebac1b6797a70f3b7e1f9b0aa830e548f893711e3b0275f352334b65bb3e01af32f031014b283a5d2b40546aab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd