Resubmissions
19/02/2024, 16:58
240219-vgxdlsgg4s 119/02/2024, 16:54
240219-vetvpsgf7w 119/02/2024, 16:51
240219-vctf6agf2t 719/02/2024, 16:48
240219-va915age6w 119/02/2024, 16:42
240219-t74d6sgd7s 719/02/2024, 16:38
240219-t5q13agh52 7Analysis
-
max time kernel
1800s -
max time network
1691s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 16:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/bLjssM
Resource
win10v2004-20231215-en
General
-
Target
https://gofile.io/d/bLjssM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528722161373793" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 936 chrome.exe 936 chrome.exe 772 chrome.exe 772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 936 wrote to memory of 4064 936 chrome.exe 84 PID 936 wrote to memory of 4064 936 chrome.exe 84 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 3892 936 chrome.exe 86 PID 936 wrote to memory of 1264 936 chrome.exe 87 PID 936 wrote to memory of 1264 936 chrome.exe 87 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88 PID 936 wrote to memory of 836 936 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/bLjssM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd7bc9758,0x7ffcd7bc9768,0x7ffcd7bc97782⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:22⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:82⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:12⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:12⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4852 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:12⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1848,i,16796268857147021810,3019070600563667797,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4884
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1092
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD523d89e5ace96f4bf866f86e00c655b6d
SHA1ab4f998c8461d70a5fd26a06d73adda54e4e083e
SHA25617fcf340e0dd1f9d1cea70e1f902c9fe2918c6b8f055cf93a1c6e3c2c912aa91
SHA51293b44f23aa5ec761668a434c92d90b95265a46a5404fbdb96f8f1837e44be0cdfefca8f3169dc598c41c8c7fb7a4d86f91e55c1189a6a59ca15aae96d6d9d97b
-
Filesize
1KB
MD57fb7977ce936557427e9f7c85cd3665f
SHA182df3cfa0db944cbb7cf4362daf6e6fd9f9d2ad2
SHA256c21e1aaf7fc3152569fd62a5369816ea809c4a16a7b3300d185cff6645c8a834
SHA5127876966bda081809f98d212774892614a40453e888dda25832599fcd5807eb552b7cc718a18e2dfefe16c5e2cee6d77ea807816c0516f2f26e8d03b25cdb0c4a
-
Filesize
705B
MD5313e0a179f4159cd2e093974b5815bdd
SHA12d8879806bfc4cc9d2bbbd26a18ea2f42c22fcb4
SHA256ea99d5e2d4d4078b873d038a224d4415b989a0c1bdddc0a987145b05bbdb2981
SHA512cee50c3d8bc137e021001811f08a63b4641bb110e7c5ced5ff8b4d2f1febb560d2efe994b02257017df5e846a93829b2ac58c5d8dd5706d0b1213ec233df2f29
-
Filesize
6KB
MD5e8826728e31f11741b0d954a13415913
SHA15b0fd01e51c9e25654be65191755e7c24cb0aa50
SHA256e548014fa62ff3b7eb17d5df2fc56990cacd3f8307cceb3dd56fc5da1d0e21e3
SHA5123b1860c30673bd67793c6d746cbc3e68cfd93c17bb8edc437aecc7712a99ba2570b8c452ae72497d3a779a1cbf420310e8edb679233a4ad0dd224c53f938c9d9
-
Filesize
114KB
MD57227edb21f8c5e7effc520a62013a424
SHA15a67190d6f4b3be9c8d2a60ecf783df9a95e40c9
SHA2561617c73544c04bb790d23c854421bed66526e607d6f9ffde662768cf5173b53c
SHA5127baf4e835de55bd61363880da1fb8cbf38476cfbdc3948b23915c47cc06bd8a32074bdf7afada20026d340bc03c48c01218063c55fa65044f3ad8e80e9c9654e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd