Analysis
-
max time kernel
1200s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 09:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://file.io/GrtNzOwUdzRW
Resource
win10v2004-20240221-en
General
-
Target
https://file.io/GrtNzOwUdzRW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531552047532171" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4728 chrome.exe 4728 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe Token: SeShutdownPrivilege 4608 chrome.exe Token: SeCreatePagefilePrivilege 4608 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe 4608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3864 4608 chrome.exe 85 PID 4608 wrote to memory of 3864 4608 chrome.exe 85 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 4840 4608 chrome.exe 90 PID 4608 wrote to memory of 1184 4608 chrome.exe 92 PID 4608 wrote to memory of 1184 4608 chrome.exe 92 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91 PID 4608 wrote to memory of 2496 4608 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://file.io/GrtNzOwUdzRW1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa86789758,0x7ffa86789768,0x7ffa867897782⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:22⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:82⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:82⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:12⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4608 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3916 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5528 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5256 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5260 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:12⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1880,i,16993948882953754815,14451111901600601254,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2552
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x520 0x5241⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
335KB
MD59aea9f406c87656ccc274ab00f76b1b5
SHA1da4933d7d28bff2396c371ddf2c34358d97fc460
SHA256cee874089fde9bf609af4ce8b0013e4aa80f45fd1ea0ac21f33364dc77226f54
SHA512e2b868422a5f3e6048a446a7b2b53c0cb3c2767f937e5a41e8a15925c482f728946f0df9338663bc82de6ea3335deecbe62944f63f0eabb0acd599790d90f08c
-
Filesize
960B
MD5362683dc5d1e01352a37287af0778bce
SHA16785c065154870c079616342dbd40cb568d7a99a
SHA2569e1d8b1a580787f62c431d316da660f1c3adb6f2d3a02ad3b0e5432662902f9d
SHA512a972c0d79a5d48725748f47aa2e0703c07b79144c15bf7d441555980045167264cd214aec062ab64b90a1d95b2f967bba82e643301b85080c4a92a8fc7643008
-
Filesize
7KB
MD5d9b6cbdd0b586c1894e595237cfbecf7
SHA178265eaa5f761701cc83ea3d2cb2e6071b6e1e6b
SHA2566ab4691de84b40a0a945b1cce276188273013e046c60111f7fbc8f17214fb1e3
SHA512755804f7826e0bf9e4831ac425846b7814cd66522f40ec92a371c1e98e843dfcda8eda42876235701c675501bae071aecbfd432f2aeb2c0fff53ce95afd1a838
-
Filesize
1KB
MD549b306bf4cfdad9a3fc0164318d2055d
SHA1f1aeaeb0fabe0fd1a53c057072c88e07288b29b5
SHA256a5c30d4048e334ffbcab68dda56656729a653034b577c5c0c4a2160264c19f97
SHA5124b63c9b09650801aa5c77a0dcd6d773aa024dcaffd0ecf0bf10ec277508e4ba457bf9f38ecba8046b0d6dce7630213725e29f48d44b74aabc2e88ae849233b11
-
Filesize
1KB
MD5f5ca756f32e2dd33880330cd31855e99
SHA1056aab700f9c010d5a0eba22714f549ef5f7b4d9
SHA256e1d01366ccd73608fa475daf9596036ea08f7ef7d943d87a2d42d2ed5093a7e9
SHA512570a709895b5fbf5dd7ae223c20dedbd330018bb8b734b833175e36a11add54229ee1aa7cbbf410de509bdb05b992b1a412519f156862cbcf12e688addf9d2f7
-
Filesize
6KB
MD5c3c94dff10482772706ec495a053713c
SHA173900f349786e9ec427664a2120aa2ae28147253
SHA25688f197e779573e0189602c324ac2676982b9b09736e47e6fc158639330071b77
SHA512b109cf5304a558a297ed7080af6cae0801e3acc24327cf4226ad4fbb10e88c49640276019d3544e8e872ef94891b3bde97066a83d7a812a9352f353881556e48
-
Filesize
130KB
MD50b020e0b2b1b013776bb91ec00b5e66d
SHA1c451f0e678cdd9df93171c9cdee6e88d58f75339
SHA256900e9483dbc2d94e3bf914ab0591857dd0e5a929352beb05bdc2d26f8db41b1d
SHA512b0b7220270a2c78d686b2e716b1e78495c8affb0ebb019da26c854fdbf36816a41c5ea7154f4b391378d7e5a401cde71c9b58b3e586ad66690afdf3bca560c41
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd