Analysis
-
max time kernel
112s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 14:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://techresearchs.benchurl.com/c/l?u=10CF2FBA&e=17B6745&c=163607&t=0&l=EE3FAAD8&email=uighiohiohjoijopijpojo&seq=1
Resource
win10v2004-20240226-en
General
-
Target
https://techresearchs.benchurl.com/c/l?u=10CF2FBA&e=17B6745&c=163607&t=0&l=EE3FAAD8&email=uighiohiohjoijopijpojo&seq=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543817981501623" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1040 chrome.exe 1040 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe Token: SeShutdownPrivilege 1040 chrome.exe Token: SeCreatePagefilePrivilege 1040 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe 1040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1040 wrote to memory of 4656 1040 chrome.exe 87 PID 1040 wrote to memory of 4656 1040 chrome.exe 87 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 1252 1040 chrome.exe 89 PID 1040 wrote to memory of 3300 1040 chrome.exe 90 PID 1040 wrote to memory of 3300 1040 chrome.exe 90 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91 PID 1040 wrote to memory of 2988 1040 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://techresearchs.benchurl.com/c/l?u=10CF2FBA&e=17B6745&c=163607&t=0&l=EE3FAAD8&email=uighiohiohjoijopijpojo&seq=11⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff819689758,0x7ff819689768,0x7ff8196897782⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:22⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:82⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:12⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:82⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5152 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:12⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3448 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3844 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:12⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2364 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:12⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=6064 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3380 --field-trial-handle=1900,i,13021726674212115323,17578628064700596899,131072 /prefetch:12⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de642d3505082bf84a54dcfcf4971e36
SHA143e5e34fb11c171713b0bff41587e80857fc0226
SHA256edbdd121ba25c0426eb51d7f49a0eaae8c200185e4a1993b890a1677714c3315
SHA51245e8dc6cef7b7a855e0dee34cabb3a1a17699773ce269a91bbdae11f7943c07f08a6bbf2cae376c19cd8b21792bea2f6fdbef2f8bdb9b0be009809a1ee074287
-
Filesize
6KB
MD5bc9baeb5820c37d4a0528c655088b3b6
SHA1656c95e2036053501bf41e07d88bb445a2822a23
SHA256344ead093dc245ec1c2b0850f34f74935d2f05a20d00087337e931f94c734a08
SHA51241416359393c86299ce12ae04009220621186af61563eac35442aa6c5244843887c47172a5674152c6a61136db4ac1cda958167aa8881647708a035ce91495e9
-
Filesize
6KB
MD5238e381e2857342182f5bffd2da37f26
SHA12de0d9c1459acaafd0a50ea04271877c3596d4ea
SHA256b5a1a6177ab117661e8870e38d3db3215adbc0c7c7f7c4ca656fa2db3e11f165
SHA51231f1449605b60b7edc497b5ed0ce5528d42cda3974b7df9ddf5df5af2a9fbb70eee86c90578f8b5f3bd5668c5e4864d0c3b5e4e672438d09df6d38309a55240e
-
Filesize
128KB
MD561c1e9a7a53995190b91506ae6e52a78
SHA11ca372d4f48bafba59f82a33c3ac56693465f60e
SHA256e6c5a199670cba81c874a54ba5789e01b8025b5b8d578a1527b1db1d5d665f4a
SHA512d0e79b0d3f97b8009fd172bd909ca20a554a65776422e98db07eed01e78a0c02ec696db0797d88fef136e6b8177dbacf87b503677561627b52c98a79962dfa92
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd