Analysis
-
max time kernel
77s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 01:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ga.l24.help
Resource
win10v2004-20240221-en
General
-
Target
http://ga.l24.help
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 208 2876 chrome.exe 29 PID 2876 wrote to memory of 208 2876 chrome.exe 29 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 1968 2876 chrome.exe 88 PID 2876 wrote to memory of 3004 2876 chrome.exe 87 PID 2876 wrote to memory of 3004 2876 chrome.exe 87 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89 PID 2876 wrote to memory of 3320 2876 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ga.l24.help1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8a4d9758,0x7ffa8a4d9768,0x7ffa8a4d97782⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:22⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:12⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:12⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4656 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4744 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:12⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:82⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3980 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4768 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:12⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2648 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4872 --field-trial-handle=1876,i,16458024981797245546,14844053814092614793,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50e1f1a32683343138f7e041d14579c45
SHA1918e8b4045c7257dddd75d74a153c80961f3f381
SHA2561747f5ae2c53f14d48430a76260c0e1ac808a971af4476ff68b258ea5c829fd2
SHA51296e18728340d1b1d50fdb07a5bce4355c4c2c381a967f8e0b2c05120fb95ef60272a874d7077d45e52ff997689d5fb68ef13e2570723a7b795e1d4e9c1bb15d1
-
Filesize
6KB
MD555eb513a4eebac6c256eec4e1f8f86f8
SHA167b1e8dc1d5ba7fe1b0af6a149c42880e8dbaf9a
SHA25626da569454af494afd8a8481fc8f7e76ae38f747a7d4048cd05d9dff7a3b6ceb
SHA5125168bc0d273d695ec971106c625a1f528fcfc11c1326ff663740455c94da7fd68b24d83a8650d9d7c21a1113f8ae00ea63fd9ab0ea025e978a426452e5530957
-
Filesize
6KB
MD5a6ebbbb6e7420cf62a58409888b2b769
SHA1cea68d28dc34d387a22e249f379980891cae68be
SHA25618a3c815030241d84048eabb3bcca0855c24f4baa4e96bffd05d6526875b10f4
SHA512707ff31043711f33ee9e8dc7545078b6be386a32667281f3016724ae1c6edc0737f7f628f4eda24cdadb79870dead9b4abb1f742dea80f2f8a2eb7ecf17e705a
-
Filesize
6KB
MD5f509c65d6856a7820fe0f079ca804100
SHA1fc9aefce2c19879e5d2b861735e695f39c97daab
SHA2569a9ce66aa7ce429b16eb62b3304ea6d195ba46f873c5f2f222ad449c6b69a178
SHA5127181efeebd22ecf399081f2ad6b99d8d614c9b1658ea379fa26cdf698368b4eedac081f9e0c042a05e766ae560c8c27d657c8efe2d6110a2138786bb9c8353c5
-
Filesize
6KB
MD51f76ec8089081be35f16e228036b734d
SHA15c9b96a583b9904bb363af143a8d9e854c011bb5
SHA256fe57375f8cac55f448c1201e82b915e60403dd966f89a37d7ed03aba87f7c2c4
SHA51242a3818a7e5fab371741a6809fac0058bc1ee08746ddc5868c656682ac820f524e471ef92d79b091cb4b81fe594e49cbd29abf29bb0664deb3dd8bb2d1236a12
-
Filesize
6KB
MD5a3827ada82fbdb1df2a3a9bf9f6abfd2
SHA1df4b9d38ce8af54a49e0bc9430043507a2bb74b2
SHA256ffb1d3c141b56d6546c3ff67da7e64f5a674d346e5de271e3ed9b602da69ef11
SHA512124338e7f0408414eab41e01f596a5acb7749804c0dd27f8e289e1b542d8fc30f84fe0b95ab5b829bde275bdb658aef88c1694e5da6b7b13e78c473cc6c8a730
-
Filesize
130KB
MD51148dbf2e67ee6fcad6f73e02a4a19df
SHA13f2eb6fa1127b9028a70980335940b99adaae514
SHA256218f3784c674503203b9e8abcf3eaee4ccc9b898512ce1d07e0d669160a7c629
SHA5121060111353facb0c4c7eb650d59a814f3fa793e33f684590c9ca9133515e4c2189c5c2c7bb909b09e223dde957f0e098f691f7c2ed129fa7f18148abb464ca6a
-
Filesize
130KB
MD5f1d8f3f773b874a29583132088f0371c
SHA1f174155f3deccf661b4b358ee7679ef2f90d2b03
SHA2561ea68c5b5aa1b2a4e0f10dc29d34715a8601a26bbabad90a28896a3e7b911743
SHA512f85572921f3a57255c9ed1f740f6e7004d664f797d0e1b80f9e95becdd0d488d5f70fecd1ccf7551758a29666ad0871d2199d2fb0264ad85f9493f064ab69670
-
Filesize
264KB
MD58b3a57c0bf1c91c0790b64d59c5dde24
SHA1251a45e8edc0ffc6e74873d3a9423fe1823616cc
SHA256adaaf49baceba9e51529e48d7cb32231f36fc4bac807a801381a55b8207d06f6
SHA512dcb9ad3c786c94d125ee4396fec1d970e4acb7ff9b1c79a807f26e56718863509711e57665fee5ba6cdebe7e910277dd0da7423d3988e0c52f3c34d949c8f143
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd