Analysis
-
max time kernel
1800s -
max time network
1689s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 18:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com
Resource
win7-20240221-en
General
-
Target
https://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe Token: SeShutdownPrivilege 3052 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe 3052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2688 3052 chrome.exe 28 PID 3052 wrote to memory of 2688 3052 chrome.exe 28 PID 3052 wrote to memory of 2688 3052 chrome.exe 28 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2480 3052 chrome.exe 30 PID 3052 wrote to memory of 2780 3052 chrome.exe 31 PID 3052 wrote to memory of 2780 3052 chrome.exe 31 PID 3052 wrote to memory of 2780 3052 chrome.exe 31 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32 PID 3052 wrote to memory of 2596 3052 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67f9758,0x7fef67f9768,0x7fef67f97782⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1268,i,17383783708194464247,9924186051529566436,131072 /prefetch:22⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1268,i,17383783708194464247,9924186051529566436,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1268,i,17383783708194464247,9924186051529566436,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1268,i,17383783708194464247,9924186051529566436,131072 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2296 --field-trial-handle=1268,i,17383783708194464247,9924186051529566436,131072 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3200 --field-trial-handle=1268,i,17383783708194464247,9924186051529566436,131072 /prefetch:12⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1152 --field-trial-handle=1268,i,17383783708194464247,9924186051529566436,131072 /prefetch:22⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3592 --field-trial-handle=1268,i,17383783708194464247,9924186051529566436,131072 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RFf7667e7.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD57116c676c98bfce7e7feb9a065f270d2
SHA13bd3548df620058a695967d7f4ffb3f4491b9e04
SHA2561b40d90696d4079aef191d8a98c09fe6e92da79f4caca241173077a5c567779d
SHA5126fabd93f54dde86f51db68ec7e728e2a06a9622a996a7d9925f2fb35f34e11b47728d47211d1c17675ae1082e36d048b4b13a8f6af4cbf07ab160dcdf8b62078
-
Filesize
1KB
MD58b464856a4010ad208fbeb67b765ea4f
SHA12f82f84fd9247355d0abc5119d933d787d5d49cb
SHA25644b4f2c5aeb2f23ff9bd3117f96c87e984743457839f7e5d64d3b27e257cefa5
SHA5126158589ed5f1ec7767a2748de4433abed39427f0dfd6a93db6d11fe81b477ce8651fe120ec13ca14e942aff74e79857c686a6a1ef6b903eb28064d16f4239a82
-
Filesize
2KB
MD585638d098dc822f454090ef1897dc47a
SHA1318767115a733f24b9206da63da981a76ea6bbbe
SHA256bda6f175e4aa0fda35ec532deac52c1e433ee3e8eb43dbaec2e2dff4ad2f66dd
SHA512a8d973354c6c606de34f27f0e3ffbe6271aeb47004e3911cb154a08128f5ccaf9a6afc46e771df9eae629412db93aff298b77bd4f11cc488edb56d283bc80850
-
Filesize
4KB
MD5c3b10dbe8185e89a3d137ab67cbb3bed
SHA162a5da0e8c71160df777cee993588bae084a2c52
SHA25647426ab30e2e2497a5f0f118408e1c9f26ac44c65c3082546ecd524f55125573
SHA512be4b52b6af048a38b81c3059de8a3b1acd4f5a4a61cbc9b0494ec8777fefae8e973d3107df33cb06e52552dd13760095793610943b99f66300a3a56c34fcedeb
-
Filesize
4KB
MD57c0d12b20ab7c3ea1976b21ed6b673a6
SHA153b04b7671bece83b4c922ced9524be122c6c637
SHA256752d073e4fffc06e76ce4eac8f88e192729f24f6ffc41c5970e8c030a38fb371
SHA5121e30cda18523b5c6b47c129b6051fbf500111122b095ef48f9915777bb29c750d2ce7237074a60235dc370fe635b442c183716f4c545160fb06b4640a4df0d1e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58