Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 06:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ecv.microsoft.com/MGLsHS93Oi
Resource
win10v2004-20240221-en
General
-
Target
https://ecv.microsoft.com/MGLsHS93Oi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 2908 chrome.exe 2908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe Token: SeShutdownPrivilege 1640 chrome.exe Token: SeCreatePagefilePrivilege 1640 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe 1640 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1332 1640 chrome.exe 57 PID 1640 wrote to memory of 1332 1640 chrome.exe 57 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 652 1640 chrome.exe 90 PID 1640 wrote to memory of 1128 1640 chrome.exe 91 PID 1640 wrote to memory of 1128 1640 chrome.exe 91 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92 PID 1640 wrote to memory of 4760 1640 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ecv.microsoft.com/MGLsHS93Oi1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff971ee9758,0x7ff971ee9768,0x7ff971ee97782⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1804,i,13743127181503501187,16669876093998067298,131072 /prefetch:22⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1804,i,13743127181503501187,16669876093998067298,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1804,i,13743127181503501187,16669876093998067298,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2736 --field-trial-handle=1804,i,13743127181503501187,16669876093998067298,131072 /prefetch:12⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2728 --field-trial-handle=1804,i,13743127181503501187,16669876093998067298,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1804,i,13743127181503501187,16669876093998067298,131072 /prefetch:82⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1804,i,13743127181503501187,16669876093998067298,131072 /prefetch:82⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1004 --field-trial-handle=1804,i,13743127181503501187,16669876093998067298,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5288c894dc63fd7c0eb50ef8cb44f7242
SHA1dd0d5e66b7b1916512ff72276a16ca1fb29cd694
SHA2566d5b3eb107bc51f3a07d1684c3708327296498585284b42c3e7fbad5232b7ff4
SHA512ea88ca510d31ee28c22dc783c9abffce4953906ffb17e0c1b8cdf65809f52810162fd8c5e38e5a523e31b5590cd78175144b00cb0cd5beb659211579c4d60934
-
Filesize
1KB
MD59726e349819c8788a27fc06b58a1d929
SHA1dc43389d38b6bc5d1e5456d856887b59e41bcce8
SHA256c4f05c08a859f6e548bc4d662d463569d42668c8112d153cb8a48f2e25b49202
SHA5126d93dfc89f38b5d462950fe3c052777cc432cef21df7a9059d4c6439a54b51714a1759da7705f565db7218dcf719fc4a4270b8ee92bcb0d0ce49731429b6838d
-
Filesize
706B
MD5fa4ed69d159077f9263e2e934d0029e4
SHA1bc96221e48a833165ccf78f2ccd853b6f730427b
SHA2566a6dd271d024a0e46a151f6b0f3950861d6d4125e44ff55a5e810b98fb79525e
SHA5123983429931461b073f920f25d53e1d6c71225d1f7ab366a92bc0010ff7edbdede1d80fd699412474ba02ac508c3442547df5cebf232842d998b472e211a91cb0
-
Filesize
706B
MD5b4e8461deb096f78155871c97327cfec
SHA1b8af5e56c81d080923028ad26c436c5ab71460f1
SHA256b8e729d021db9ff52d2f70cc516dfda251329527c76a6725aa50608e33e24166
SHA5129baa039d30cea6d809b4dc121c990d2c299ea781cf660feef0081a4090ab99886b92aedb86b0d6fcd2e6f22d60e8829dfc1f47a0f1514357272183be32436605
-
Filesize
6KB
MD58b837ea475f5bcfe1154694f5a1afd3b
SHA11a0963cfb36ec36e0d9db491256a71cfbbfd0b98
SHA256035be2d4d564e652be9c9937710862a53dba704e3b233506af62c1763347ba70
SHA5122d6618112a526e97e0d54f8c49bc19241295c39a4d007e006efdf2e05683e16af5d249b2aa1503b67a968b001b0e9cd8fa9ea92b1774a97968504274332c86a6
-
Filesize
6KB
MD5f302fb429f06e490a8da63ce8914840d
SHA1fd9754b68a4f851e57f9b93e1e541ed9be678feb
SHA256e7fd6178b39846959a7615bb23064a0f92165ffc09f6ee2e17fb5a80ced0bb5f
SHA51208301d8643db17894391e0da816fb113fa4ede5a53753f4db2edd8f34978cd7174274905e0c4701d849353873f74ff30e8a4df5b3adc602b196788cc70ee0fa2
-
Filesize
130KB
MD56ff566ff1e04c06010108a0a730cfc8d
SHA19830c839b6f8764923696602313650aa18886557
SHA25603832df7ee8785fcf4dc51486882b341f080051c8b5363bebfc5828c4c442694
SHA51212cde2557a66cff15309ed3fb9cb09adbc2d5e2decd4cf12b93f341c3543e0bde46614144a770f6825901a7b37eabeff2399fd12ce616ff68caaa363fad4ddc5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd