Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 07:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s.id/22vFp
Resource
win10v2004-20240226-en
General
-
Target
https://s.id/22vFp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133542700278277243" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 2696 chrome.exe 2696 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2268 1632 chrome.exe 87 PID 1632 wrote to memory of 2268 1632 chrome.exe 87 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 2112 1632 chrome.exe 89 PID 1632 wrote to memory of 3588 1632 chrome.exe 90 PID 1632 wrote to memory of 3588 1632 chrome.exe 90 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91 PID 1632 wrote to memory of 2172 1632 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://s.id/22vFp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb44f39758,0x7ffb44f39768,0x7ffb44f397782⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:22⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:82⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2816 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2824 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5232 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:12⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=824 --field-trial-handle=1892,i,7405771931254677926,10889941563041747285,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4856
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD576f6d515b580c48be534066643a02b71
SHA15f12cec53d18b08970b91002c6a99f0ee2f485e6
SHA25666c733fe3809a8f3b934537be8e507a5b169bdaeecbe9eed7955ad36650eaaf0
SHA512697d72380c3156f8f1397857eacf20ab5e7ff3456f4c6087e10fbbed8f1246cd792c5c293024d049ab06b90034c0d18cbc7bdd6aeeaccaa51204646fb60b98be
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\81a54a11-80ba-4c8c-803c-39331262fa01.tmp
Filesize873B
MD58606213e9b86f4fb3957ebc5f88b4456
SHA103dd7d942e095bdb313b7b93fb7b7a777f0e514f
SHA256e3f36f067540c1c91a6ef6aebbc87d49062d1d31a97fde26e383b393dc762066
SHA512113d2cc508b2f2795b11ebc69f05469f3f04c51f10b9696e18a903c0eaae4f5b8c778a841b1360001757da7483e51ce1ab8331cab4e6e1a9d36cd5df21bf2941
-
Filesize
2KB
MD59ec7eb7333e6d0d414b271c4d6aea69e
SHA15a65bc89aded6e0b546238a6cc50eb504fb884ef
SHA256ec0b8b708eb356d4d446d555e871ab0d881e999bbb11ca9789d4e4034dcb999c
SHA512756c7f081bd1c2709bab3108d7f7a522357242a35a36f5da69fff298effecdf4b4c3c4452a419b38339986faa4cf6994bf6af8f6ed56240124374bcea48a38d7
-
Filesize
6KB
MD5ca49af2f91179522ebd9b76f345c487b
SHA1fc0cf9e52c68d60b38f611aea11e50cede52c7cc
SHA25611c564841ec02b10c330477c2c7314dbf413a78cd97df0bbb8b805044ed2574a
SHA512fe8f06a8f59ff7b1c59bd4703d702971b34c4e8cfb3b6993cf395fb11fcd0d7f3fa2398e569dd2d7f6a38b9f5dea3ec4e38cc29311cdb19d88d0e1e6bd81ae80
-
Filesize
128KB
MD59e668a14787462b90d69565c0ab30a44
SHA120be2380feccc5ee46c3781523feeb570639b7d7
SHA25679bc33b17c0f05f1478ee318a21b2a911293c3aaaf57ff0eafd3a522265616bf
SHA512d8ee26cc43f9d5e576e21e2f7f619d7b4353b99a4a0a3fec93eeba638c24e65f16b5ccc911244ddc7bbcbd80037e49e684f1c889f07dbaedc1ce22bf84e6acdf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd