Analysis
-
max time kernel
599s -
max time network
590s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
23/02/2024, 12:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://easyupload.io/i1oqv9
Resource
win10-20240221-en
General
-
Target
https://easyupload.io/i1oqv9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531666637033664" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 2404 chrome.exe 2404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 4656 4044 chrome.exe 64 PID 4044 wrote to memory of 4656 4044 chrome.exe 64 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 3984 4044 chrome.exe 77 PID 4044 wrote to memory of 2932 4044 chrome.exe 76 PID 4044 wrote to memory of 2932 4044 chrome.exe 76 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75 PID 4044 wrote to memory of 4184 4044 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://easyupload.io/i1oqv91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9ec039758,0x7ff9ec039768,0x7ff9ec0397782⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2028 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:82⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:82⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:22⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2800 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:12⤵PID:312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2796 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4960 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:12⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:82⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1820,i,5784779199570848350,16340638040419943731,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
792B
MD5d5c48a7c06af6a8b5ac1390b157ad205
SHA1d5fd5dc8aa7b216c3128f0f3d32d5f2c6af37927
SHA25666a009dd0cd35f5410ced19a0ef2ce25bfbaf8fb5c1fd061b899397d3f117087
SHA512a8cf017ec18f5309fbcaaa19df9c63ccc4cb76b56e6400ccba46196332956f4b9b0e6acd988ef1706c978e0688f93a7ef95025342f4b68c95674c2ad1cd6ef66
-
Filesize
1KB
MD54df14a4d1dfb47978e71deda2394628f
SHA104bee73143f547181bd5952507dc72b13d673f36
SHA256ce1cb67d92dd180ce573dfad0e3e8be45e2fcaf12e9c44771de125a7dcf47ce8
SHA51272be104f481a9e7a9abf15c555a898bb31c0766aca1ce336e1495efbed839a10142d063cada21e5e3f280aaefadb492765fad614ab48b84fd2af255791902655
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\ff3ca9a4-86b9-4ed6-aab1-4b4a656e6068.tmp
Filesize4KB
MD5e2cd879c257c82295470616c8ddd6cd4
SHA1af8fd389cd256e3077af080517e536fed74e2fb9
SHA256fe209ca3e39f51043d020eb6eb6be8afd1544ef60a439c81f07722b41fe9c14d
SHA512cb022b7c8eebf574f7a5a6b076fd9a0a117f877801adac6f946c31398869045d893c076d1a55c1cc1ea0f57e30d87d902288ddbe526765ebe313fe1f886a12f8
-
Filesize
6KB
MD53b506affbdded390d48bdd7e8fb61db3
SHA12dc0cacd2cd3d9a7e74d6a1e4f9d4046b60d5651
SHA256b74beb8c5348a37929aa7292e6cf253ca6445beb97c59c2476d2c36e004d23ae
SHA512296c38a41f796b621679d1ea7c6755788ee0f7059105c10029b718b9de459a37ccaf1843a1430ee49649e193a09dc110c0eb3c01cae4597cda96a1c14df51d9f
-
Filesize
130KB
MD522bf771fbb77e0622a62c787f9663e52
SHA1978492ad302a1ea9cb1fe4494d65c38d79f73b51
SHA2562d01e29a7258762636d4f571f29fa4bc7b629a001f1863bc40fc54b9c33e3201
SHA5129dddaed6701b67c878c39c39ec2afd7998022942dfea700bd819e67dba1d814315d74e716ebaacec97bf4fe0b348c3debad9cada9120b9fc16cee352df28ff33