Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/02/2024, 06:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/q53ONj
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
https://gofile.io/d/q53ONj
Resource
win11-20240221-en
General
-
Target
https://gofile.io/d/q53ONj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532310251012017" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 1488 chrome.exe 1488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 3580 5024 chrome.exe 29 PID 5024 wrote to memory of 3580 5024 chrome.exe 29 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 4516 5024 chrome.exe 82 PID 5024 wrote to memory of 3616 5024 chrome.exe 83 PID 5024 wrote to memory of 3616 5024 chrome.exe 83 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84 PID 5024 wrote to memory of 2688 5024 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/q53ONj1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb563f9758,0x7ffb563f9768,0x7ffb563f97782⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:22⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4656 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1824,i,6082407279940291414,8655474798660160649,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5820260522a4b2eba33a69795d754650a
SHA18263971ad716805642f5285b5a1e4eb839a364de
SHA2569ebd90264bcfb0a65fdfb37775b91d9cf8d433fcbcd128e9b7aed27d8d4ef03b
SHA51232166ae049761c19f23365be3f43f58d097e8917c89cc9b0f214abad9dfccd8687337b811cee978731bfaa44235dd998b5ae0b732c6a4edcb85b05bf5c381583
-
Filesize
288B
MD59012818c00060f003ba71e12eea2203e
SHA1c382bb8918dbf00f69dd9f526979b32028a1bb23
SHA2566b176654fefa3604700242bda82dab41baeef74bd18d093e214fbeaeb499a6b2
SHA512e083b3bcd7f2833bbb4dbeeeaf59fb8dfa9ea37739a94257c682b64c57deee3154567b79e3ec4156a2d588b5bdb596eabf817786e7b1ac9eca4a3bd2e9c320e2
-
Filesize
1KB
MD5b58eb6907849a81eaa0af658caf0cde9
SHA1053ab1bbaf6f3c42d1591c8cc274896709336c3e
SHA256613e7fb9c20009c475bcf45d6882907337c0a5ca7e41285ef53fbeb78f1f6fa6
SHA5126f59646889f5a2c6c9688ccc0843913db7ade758616cbf901df897014ef86165e02240d32e661604ecaaf0cf1b11a36d429355da78257cb1fd9876041487af82
-
Filesize
705B
MD5fd623a29321b4bb4fc18b06732b7288d
SHA147f5fbb9b75b5e26d79cb8f3cc18bf7871bf08aa
SHA256288b30695a9ba777e121075b49b5104846dbc4eb8be9c3fb6a8f5ecda2470a87
SHA5127591d92b74c83a7dd33af7c7ff0dbdfc6e8967747675ed491c07232a577abd2c0b260f071b292e0cbcdab77be2772c7c398a30be2801bb88e06451645de256b6
-
Filesize
6KB
MD5d7713e06ba75f0fc3bf60ba58839b9af
SHA198eacd4761731fe11d0c90c301975be3c3d0b284
SHA25606fc845029f98d1ba2d1e2445cc0da61ed47669a800894240601d95054cb149a
SHA5128962c8256285b9020f3ed39cf128e4b6f81fd516a6be5745312eeed1f719acf5edbd818be4f2cf49f98c90189a79bb853a01a4ea288862067ae5202735dda9aa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd