Analysis
-
max time kernel
14s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 15:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://goo.su/tLcl
Resource
win10v2004-20231215-en
General
-
Target
https://goo.su/tLcl
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 drive.google.com 13 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133522242734145331" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-768304381-2824894965-3840216961-1000\{4C816711-5299-4F70-8FFD-39A102961B08} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2976 chrome.exe 2976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe Token: SeShutdownPrivilege 2976 chrome.exe Token: SeCreatePagefilePrivilege 2976 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3832 2976 chrome.exe 84 PID 2976 wrote to memory of 3832 2976 chrome.exe 84 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 316 2976 chrome.exe 86 PID 2976 wrote to memory of 4528 2976 chrome.exe 87 PID 2976 wrote to memory of 4528 2976 chrome.exe 87 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88 PID 2976 wrote to memory of 1108 2976 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://goo.su/tLcl1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6a1b9758,0x7fff6a1b9768,0x7fff6a1b97782⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:22⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:12⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3412 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:82⤵
- Modifies registry class
PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3332 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1732,i,16931889512963879083,3081520789601690660,131072 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD5f2cb8c3fa0fc10d6749685a61be80550
SHA18e36d2547d80f0a84456622fabf2a8a71b543874
SHA256c387c8616735583b1a444759e9d0e4e27e7cdb2d93fb24f884f69c40022340af
SHA51244d58142df04f75254a09bf23eb4550181ff67619292ac0fb396261524a52e5288a24b2720c6b6cfc1fe0067f4ba575abb3b93cb8612b9c6bfdd2d26283d9974
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD56c8727e381a041ac71dd212cfc583334
SHA1e92e47d2ecac691ea78763d01fed63f749aca800
SHA256f235157979b12f9b17df5d52d2f703cc41b55cf4f43cc00b7fb80821bacb3f9e
SHA51291a585befd2ce0b93febe7964eab69085e23aa59c2682342717a8bcf18248a735b3ad3eeda70648f685ae90817086077eec73744817d6fba32dbf1f7852cb4a4
-
Filesize
371B
MD5f135341c6ce92b08edaaf3530ca26a0c
SHA106851c61663ec6d688cd4efd33f5a26722c56f17
SHA256b1ca17b237a5f7090a44c82a5f9aecba1d14f0ec0be0ea81e840c4183eca6681
SHA512cabd3beef3c80fded81269226c8e80790702043a8e28d91b3f45405b89e5c8a7e3b0024e4713c8a03c425b0f768d94d017650949788c910536d52c5cfb4bd7d7
-
Filesize
6KB
MD5f7fe59174e679d15e181d3c511123738
SHA1bf8334ca4b4f7f95ae6f204428f523157b257540
SHA256d41f5bdfe8ccd52b1a4a651a1baafc95b52ce65c671094ef0b19c3f2127ac9ac
SHA5125fcd6461686b084569a185fff4153e428607b844f5081fef4eb7def718ba86a2c8c81de7193ebc2e3e0d06d84572be8d9f597d5b93490360cd7f62dfda566cb3
-
Filesize
6KB
MD59880358f1db7ccee0370b225ceb6ee61
SHA18b7fa85584358861039e24831496f1f31ee7b5d2
SHA2567d1ad9e5e81326078fed1f4bb803068d8e30a9285e05378e73085d08627815d2
SHA5127806092de7dfefa5a25da872f879c3c10ff649ef0ae0a5e1ebb0b601d2617e7ba04a13c50fc8113f73ee98c9f4105dc623d6aaa27c7f4d9d8758564a28a10760
-
Filesize
64KB
MD5fbc092c12b68466578d91e82ff9a8df9
SHA1346cc0f6236b831a5569776fdcd93476380abe78
SHA256384095265c75b42fd03cb79288b33927d848f8e09996fdbebf0d1f05b01604cc
SHA512df2e30e49f5fe3a84ee65e769b9275d0d51d28f5378ad0371d14ae0d002086d5eef2351888528bb792fd124649784a3ca7e10d11b144b54e85ce9a371495e9ba
-
Filesize
116KB
MD534120c94b2e65cc1424010d47f5b3a42
SHA18b56fb93c51ed6e981aa65ca4379450f85c721b4
SHA256ea42b06747479820b98979b4452034e2ff87560cb2befd71864bd80c5cd9a009
SHA5127b3f1459ec1eb6c3f404aca19ae34f751d15515241f34782c28f4ad8f57adb2ad77e7bd8859e9c362696d9a962ee6df9cbbc7cab57c5b688c1e0f02e4053b8ff
-
Filesize
116KB
MD598fa6469722416b0abb7063afc196072
SHA1ea8a444bacad9105162722d2371577eba4778332
SHA25642e14f4a2062985020704228a7c3d1ee937b4da28b736729917c12950ebd90d0
SHA51256a73bbdb6f0c5aa0496917b1de1735b189b9c5885f4f1c6005c4b33f68ca0bdfb2444b11c53f55ee538990b56829d2ac50a3a4a193de4f3edcea1d5188628ac
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd