Analysis
-
max time kernel
126s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 22:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://0s6im.mjt.lu/lnk/AW0AADq9v3IAAAAAAAAAACD7QoEAAAAAQUoAAAAAABo2LgBl6Xw8gsGTZ9QwQhO54Wl5UA75kgAZS2Q/2/6dYsQg_HhMJUCUsEQVcNHg/aHR0cHM6Ly93d3cuYXZpYXBvb2wuY29tLw
Resource
win10v2004-20240226-en
General
-
Target
http://0s6im.mjt.lu/lnk/AW0AADq9v3IAAAAAAAAAACD7QoEAAAAAQUoAAAAAABo2LgBl6Xw8gsGTZ9QwQhO54Wl5UA75kgAZS2Q/2/6dYsQg_HhMJUCUsEQVcNHg/aHR0cHM6Ly93d3cuYXZpYXBvb2wuY29tLw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543237827246402" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 2180 chrome.exe 2180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4852 1080 chrome.exe 89 PID 1080 wrote to memory of 4852 1080 chrome.exe 89 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4760 1080 chrome.exe 91 PID 1080 wrote to memory of 4204 1080 chrome.exe 92 PID 1080 wrote to memory of 4204 1080 chrome.exe 92 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93 PID 1080 wrote to memory of 3600 1080 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://0s6im.mjt.lu/lnk/AW0AADq9v3IAAAAAAAAAACD7QoEAAAAAQUoAAAAAABo2LgBl6Xw8gsGTZ9QwQhO54Wl5UA75kgAZS2Q/2/6dYsQg_HhMJUCUsEQVcNHg/aHR0cHM6Ly93d3cuYXZpYXBvb2wuY29tLw1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xa4,0x108,0x7ffcdf329758,0x7ffcdf329768,0x7ffcdf3297782⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:22⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:82⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:12⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4656 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:12⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2872 --field-trial-handle=1868,i,4925678649272110942,11937713393483251408,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD563e934884510a49ea73a8ab2c9ab8adb
SHA10be089a934275f1e250e0d026fff38e1b4395f72
SHA25644811c9b1a4dcf01841779eb8b233654e67f1f2f83703cda340de239df87a458
SHA512f48acddead04193fdd013648b7e1af1465de7ca51a2f8ba57b169ea591e22eb9866142978d785c589f39ac6776883864efe017bdf6f7e5faabd16b6c269a118a
-
Filesize
2KB
MD55bc18fa80a819d751cc75a23bb5ac485
SHA186a6a7db130f45c45b4827f0e0143edf8c222cc3
SHA2568cf8dbf02f695fc39a63f37114cfad52468e8a2b072c5eb3c171f60f8151f1bb
SHA512a3610d5e011e354997c62064f99b07eb04ab9d290c26315bb35c4682e1620eb723e52c8b374404d9db69c59a4427e1ef0e41ed7bd399de70c0c1416ee26a7ad9
-
Filesize
1KB
MD5a3254da21f0b39a5bc952a1c498a0d49
SHA1e46a597fdc788ba25084985b30777f3943c96d51
SHA256f4f3897e697622eb7f790dad0dd2d1fac5dfc81d60eea3ff979951bb7c046b42
SHA5127a899265ef4229fd0d57490f765812b24522741d19a61dc52723318d74eb9ca84c960109813b05f44969049e2541f0583cae4b2bcc082ac11448a5a6df624a8d
-
Filesize
6KB
MD5a658c404f1c8b1ebe24ee015addb4ff7
SHA14d16236230291dc13384f534e53bd1e353a15e97
SHA25653e08df1d7bcc6d3cf5b943ef08f944ddf1f3848b700f5640d519b4bb2d4d01f
SHA512d684269bac9e9a9f718bf878e21c3cb0f432de26f7b36d0b7b185ef2260bd57e26394cc9bb23882fb837bbe7375da13da3e54be09651e9f1557e03b302861ab3
-
Filesize
128KB
MD51972de18fcf4fc871032d74c6a7e9082
SHA11d5be0e3920068d9331f52f2d69f2817f5327e5f
SHA256784eb065235a625cf8fea1e711df6e7c42193f4b27c1a1a176553e009524fc4c
SHA51287e703b5f1987c217ec0e275eedcea4ede07a719b60973803a8ace0f0272896d0613f693a0dc9f0a80c6d0b1127128187f90255949c3c4e8a552af571c523090
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd