Analysis
-
max time kernel
1800s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 14:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/LxbjQa
Resource
win10v2004-20240226-en
General
-
Target
https://gofile.io/d/LxbjQa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133543823666757618" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe Token: SeShutdownPrivilege 1452 chrome.exe Token: SeCreatePagefilePrivilege 1452 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe 1452 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 4180 1452 chrome.exe 89 PID 1452 wrote to memory of 4180 1452 chrome.exe 89 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 3012 1452 chrome.exe 91 PID 1452 wrote to memory of 5072 1452 chrome.exe 92 PID 1452 wrote to memory of 5072 1452 chrome.exe 92 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93 PID 1452 wrote to memory of 2652 1452 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/LxbjQa1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff842539758,0x7ff842539768,0x7ff8425397782⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=384 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:22⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2844 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:12⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2852 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:12⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4584 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:12⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3332 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:12⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5340 --field-trial-handle=1644,i,8093408698675708254,1082454903652838853,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2264
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5180815ed54400bcab9750271540ddf94
SHA169ed9637b280228f9c3075469f144dd3a211d51e
SHA256236e887aa2102764a0e084f782ad1f3a04fd3be8e5f825130258ac478cd7b39c
SHA512ed3a6ecde3af795aa4965bf8ed60d1fd7294f67cbc08548e3e2ba18d4fd28eed9bdeaaa0ba6f25758f7608172936371a30669e8378c971b18b1ab118f3c1305e
-
Filesize
2KB
MD545be37337e6699edb83efff85e313e9e
SHA11b467e42441a73c15729e605b36e67d060bbbf00
SHA2568109ecb1c47083cd8e6d2d0033f0351e88aa4aba4d6c65de18422d3828075e85
SHA51261e84bf90666ee9bc2b4250c8a3fcb9706b133b3cf1f7f155d7d32ac14ecd2685800cac5d5e31ad28831b964204a0053458f81963929dca7c89e9c348eb92552
-
Filesize
2KB
MD5293ba746ac6f6618d8c9d2149b844aa4
SHA115cb0c1d9d98a07d11f7d2504f81997f9168b625
SHA2560919efa70a171cdc76a486a84389f8358f56b54fdf59e7cca925b1b6d9451241
SHA5129e659b6a54f66c979c6307d76584c1cb0b748abed34c8214abbfb044a4564074fccfa20739134cc15554ff602422c0f4fb1be2eb44e593851f0343d133437080
-
Filesize
1KB
MD527bea1f9b29ab2c7a1e83aa5e7a95aee
SHA1c7c0cdcdd11e876841895141e89398473b5990a0
SHA256c2e2b6f4293cd2d4a2728d6f32aaef6f961eae307f972d69d06cecd52b320839
SHA512536a24ff47dfcc4790a5e1de686c20d5144233175550750d03101bd0b5fe4c170066c2655bb006af1fa7dc412f7de71de9c35e0a491aac502e56736cb0c20cdf
-
Filesize
2KB
MD522ed510b9552325a8ac01eba32910f7f
SHA18f60cb937c603c550a057d43e2c44de9a48f9b6b
SHA2568a9cd22695fff5bdcb8214a165116e59793415ce6440a98da0e7a0da531ba0c0
SHA512326116e068261deb479d61ff259515e84db2b2ee7765e9c9f5eb105eed6a5c34a5312fca9dd3488bb67b28b1b52e0799f42e2c4bbec82fbbf6bf35a0fcddecfa
-
Filesize
873B
MD54a389dae37e172a04486ea6e900df3cc
SHA1249c8fe4e9a41924caccc4a0b80bae47b86fd287
SHA2568f87692437da26a12d1073c789491faed0b2b97740f1f3b656f23120e0b415b2
SHA5126fec05eaa9bdbb432880eed24d272118d55181edb27e9afbe3c9dafbb5cfee1428ee307bc3aa3325dd17a4d4a471c78c13d5e4ffe00e9602ca04880f7b579258
-
Filesize
6KB
MD518e0f45576dbc3f97120d4b155881432
SHA1595f0b6b0d88a7466c128e53616d6d1404c8e471
SHA256df043ff1bf01ac3438d390203d7b2f637806c564744652fe58d2faef223907f3
SHA512b383dba9d2c8a3b048633151da24e6c4193c1631508f9a83fd2fdd12eb83f0d83db64f2e47f429fa7b3e4cb40a47e2bd05719e1976aa5e46d0f0de4febdb45ee
-
Filesize
128KB
MD5f8774f135e915f1b3e13b125dbe02f73
SHA1edca6b938ba0aaebe45bd116127a0885fa76853f
SHA25676b64245787e23b64e804fabaadf1d76fab2e8c3e00cc995361ab8c004f6862e
SHA5128251e8f7f9bbdab8e39a8918e981906c960cc0979f2298c18c8a79ec39747438ac51bdfca43c460c070110e7e23291ae641f01765625cf10f57b03b7e831502f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd