Analysis
-
max time kernel
33s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 22:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.uptopacks.com/2024/01/how-to-boost-fps-fix-fps-drops-in.html
Resource
win10v2004-20240226-en
General
-
Target
https://www.uptopacks.com/2024/01/how-to-boost-fps-fix-fps-drops-in.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546700634064170" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe Token: SeShutdownPrivilege 4024 chrome.exe Token: SeCreatePagefilePrivilege 4024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe 4024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4116 4024 chrome.exe 93 PID 4024 wrote to memory of 4116 4024 chrome.exe 93 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 4612 4024 chrome.exe 97 PID 4024 wrote to memory of 2384 4024 chrome.exe 98 PID 4024 wrote to memory of 2384 4024 chrome.exe 98 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99 PID 4024 wrote to memory of 4352 4024 chrome.exe 99
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.uptopacks.com/2024/01/how-to-boost-fps-fix-fps-drops-in.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd4209758,0x7ffbd4209768,0x7ffbd42097782⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:22⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2944 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:12⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5032 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:12⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5200 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:12⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:82⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:82⤵PID:5984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5504 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:12⤵PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5140 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:12⤵PID:5348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5972 --field-trial-handle=1892,i,15466271552387368416,2275451349431504586,131072 /prefetch:12⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
Filesize
24KB
MD5b82ca47ee5d42100e589bdd94e57936e
SHA10dad0cd7d0472248b9b409b02122d13bab513b4c
SHA256d3c59060e591b3839ec59cad150c0a38a2a2a6ba4cc4dc5530f68be54f14ef1d
SHA51258840a773a3a6cb0913e6a542934daecaef9c0eeab626446a29a70cd6d063fdb012229ff2ccfa283e3c05bc2a91a7cac331293965264715bdb9020f162dc7383
-
Filesize
1KB
MD53276e88569dc994fa680b72096ac6ba8
SHA19a41bdb76cb98907545d4f62b7e4b52d57cb5270
SHA2564a1afca8e64a767b0bc77077f99531bc701776628c7385d179cccae6dd739b37
SHA512f5d1761e6b4f044cf13165f6d280b2101147d08913c99277880b2858f2f535058704ab29fc8bc24daa3821903c1ac0fe6b73600000db962a60c363d3d006584c
-
Filesize
872B
MD52b7205b1911728edcfabf4021f6d1d4d
SHA171756a9e7039048274601b40053d37544d4b9c56
SHA25603120e1c6d77291bd5277a09c2e6ade42ca346dd260decf5568aff36c98c307f
SHA5126e88282e9de14e90392485e8226a3f56c47afca9262538f06e72be9dbd4f003c63c07adb7ec4f5fff339f2eced846739e43af90a1a26e06f6b940366447491c5
-
Filesize
1KB
MD5605e812847ec5313cfe821e146c542cb
SHA15fa73d53b0fb665dbcf29327e63de97ba02e94d0
SHA256f932441e4687b91262b8bccd48be237783f23ff91aa0527afa618d06f50705d7
SHA512968b8035ab14b8b647d20ce582a0eeb4b1792d453733b8736faba9dfd4e0d14969ea01d5ccab1819097ba80c87661f9a2b1d4b7f9e56914207bd4099a2adcc68
-
Filesize
6KB
MD557dbe82aef637c0fde5ab7e5fef1389e
SHA1e7b94d54cd286338115eec8cf55b996a9f61fbb1
SHA2564e4b65e602b0f47a8dcc45caddc1617a733523cf04191353b834ea1a0c97bd59
SHA5127008dcdaf0168a392dc1123c30510100d8f28170f246001d6f239582795808c609868285fa3a3013253239a114f56a441347059d72f3f9c8f666b2fd8862dd10
-
Filesize
6KB
MD52c5330da91deb680498c63cc2c546381
SHA114024617bd7958bff769a063e42eff9391a31234
SHA2565f418fb3489ea27c8728c00a0b4657f74e85d9849a06c16d1e122ef2d08fb6d1
SHA512ac16b5dc97d11c2359cbfb3f1af2e698c627c015f315fcaa3a9f35d9c1b74edfbc4ff1c7c65f20706ca38e6d9a8f54341633375019353e651d2ade8c95bd3086
-
Filesize
253KB
MD57ef29023d0f5f9482692c30a8340ba35
SHA119342552034ce6f800a244de6b4287f88a012670
SHA25606de67d41b79209718a67277da8025934619a9910c35df7b3704f933be5aecc8
SHA51207003391a0747da2f9f9e3d9a17b8e0bf68043318e3ace85a9dd6636c5ac5351f7d6ca08e76b16f0619f17f0479e9ac6b22a610dc948a22ce8ae051644637f7b
-
Filesize
253KB
MD5456aeeb0a8a13d5fbc553eee9cf24455
SHA1a827e8e39a54f87d5e9d960dab4de9b9d709537e
SHA2568e83c09554dec7d2fa7c51f5166d291a81fe7b76fa723e713e917c4487277718
SHA5121cf691b13dcba797482a750e6129ababa02e1a7e1273d63123643ebad72cc4aefd84f90fd900ae7b3254822aa827acf627585032ea14fa1e97a925bbac54d3dc
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd