Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 06:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001iUjC-dcNyQU9RUIicoujI-25wkjkH3xvAAYuzFPVOVXL2ejp5uzCBVIRBzW3uomObOLurU7kH7SZ2IwECS9FNwkXYeJXSw3tv4Fzs4yEKC0RoS7-txuAjXb8j29rRpa6uMdTE6_ICjUKFEp5a-JG0wGm0b-ZCdRvGrBAgJl5D5y6W-YnqyT3AuPuceU3YRlvTgpiHvP2iRKc9I1RPFtetljZvOU-WOlQ57GHUlJvnPw=&c=qH1a67od87MtaE7mt9LqZfWXZLIR9an1GM5cUowUVDJ2XXKXrtQcdQ==&ch=5tjmte6PbHBySlhjlvTBeZ7uJB_BrizlKlF4BmvzqNEtTMjG5IH_Iw==
Resource
win10v2004-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001iUjC-dcNyQU9RUIicoujI-25wkjkH3xvAAYuzFPVOVXL2ejp5uzCBVIRBzW3uomObOLurU7kH7SZ2IwECS9FNwkXYeJXSw3tv4Fzs4yEKC0RoS7-txuAjXb8j29rRpa6uMdTE6_ICjUKFEp5a-JG0wGm0b-ZCdRvGrBAgJl5D5y6W-YnqyT3AuPuceU3YRlvTgpiHvP2iRKc9I1RPFtetljZvOU-WOlQ57GHUlJvnPw=&c=qH1a67od87MtaE7mt9LqZfWXZLIR9an1GM5cUowUVDJ2XXKXrtQcdQ==&ch=5tjmte6PbHBySlhjlvTBeZ7uJB_BrizlKlF4BmvzqNEtTMjG5IH_Iw==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133527969185395980" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1068 chrome.exe 1068 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe Token: SeShutdownPrivilege 1068 chrome.exe Token: SeCreatePagefilePrivilege 1068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe 1068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1068 wrote to memory of 4236 1068 chrome.exe 17 PID 1068 wrote to memory of 4236 1068 chrome.exe 17 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 4596 1068 chrome.exe 86 PID 1068 wrote to memory of 1072 1068 chrome.exe 87 PID 1068 wrote to memory of 1072 1068 chrome.exe 87 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88 PID 1068 wrote to memory of 4584 1068 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001iUjC-dcNyQU9RUIicoujI-25wkjkH3xvAAYuzFPVOVXL2ejp5uzCBVIRBzW3uomObOLurU7kH7SZ2IwECS9FNwkXYeJXSw3tv4Fzs4yEKC0RoS7-txuAjXb8j29rRpa6uMdTE6_ICjUKFEp5a-JG0wGm0b-ZCdRvGrBAgJl5D5y6W-YnqyT3AuPuceU3YRlvTgpiHvP2iRKc9I1RPFtetljZvOU-WOlQ57GHUlJvnPw=&c=qH1a67od87MtaE7mt9LqZfWXZLIR9an1GM5cUowUVDJ2XXKXrtQcdQ==&ch=5tjmte6PbHBySlhjlvTBeZ7uJB_BrizlKlF4BmvzqNEtTMjG5IH_Iw==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc005b9758,0x7ffc005b9768,0x7ffc005b97782⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:22⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:82⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2772 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2764 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:12⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4768 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5064 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:12⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2768 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2472 --field-trial-handle=1896,i,845736499759178701,5202733091872983167,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c8d8de8fa5d33e614243dfa28f90b2f2
SHA1d577e7aa39d5ddd0d70127ada208a5c00eef866a
SHA256ef110957e861aed77196882520326d726a2144f8ae382ccde6692341092bbdd4
SHA512e9a4b3bd3b57bd15c95e6fea63bbbfe82b3a9ed7354497c2010ebd3d3ef1c01acd857d4ecc8e894a392c13b2b597e94fd62abfcb46e5f22c8a89b4c94209de56
-
Filesize
823B
MD5bff8f00c532978dac5e02fb08cdb4827
SHA19b177794c2830e4362d0219402c3f5978d433b37
SHA25642e32f6676f7b6eb7fd7206b4fbdc62cb89c502b0ed1ccae5d256400963ed878
SHA512e91e1c4b382d9e54c69363d3a1ba7323958cfe1c2edebfdb49271773dfa58918bdba5a40d677891cab7134aaa0d894df332415171a34a804b17d18ab4c5cc3ad
-
Filesize
6KB
MD52a90183c03bb9fe270602172cd5dcfd1
SHA1581fd1ab618fce2de77342792df8835fe495d699
SHA256fc2879a723c87dfe94bd42f3ff238f24e1e67b4bb746a4164719c1604459a20d
SHA512fa59a68f3961f1e2a694133ad4a40bbdc6ef73e9ed350dadc4809c1a060510739a86eb57a55ba07154195fc413ef2c2ecfba469e8540fbea38a7202c204af03e
-
Filesize
114KB
MD5ce1f45138357d6040b7bf385c3e98a8e
SHA1fc850096bdff4e7d572102b17ec223d83615d042
SHA25644151cb3f6680ed82105f1a9471ef860f3acfeea036159db1ecd43f34cb3b80b
SHA512aab9fb95bf8dd4cce804aa17d8a056f5c4e8d1fda496cb1827094afda8eb6ab38da31892adac4e4b767ce11b914f83bef0c560a7fef6230e1a0ecfdf0917a12a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd