Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 14:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go-link.ru/jAGQM
Resource
win10v2004-20240226-en
General
-
Target
https://go-link.ru/jAGQM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546408423263080" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 848 chrome.exe 848 chrome.exe 3584 chrome.exe 3584 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 848 chrome.exe 848 chrome.exe 848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe Token: SeShutdownPrivilege 848 chrome.exe Token: SeCreatePagefilePrivilege 848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe 848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 848 wrote to memory of 4424 848 chrome.exe chrome.exe PID 848 wrote to memory of 4424 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 2116 848 chrome.exe chrome.exe PID 848 wrote to memory of 552 848 chrome.exe chrome.exe PID 848 wrote to memory of 552 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe PID 848 wrote to memory of 3808 848 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go-link.ru/jAGQM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1cce9758,0x7ffe1cce9768,0x7ffe1cce97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4008 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2388 --field-trial-handle=1900,i,6542072825626304719,6381502665206486003,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
648B
MD5cd08c4f658e2792593383be69a3ee45a
SHA1e3dfa8a8cb795fe6a8a2e499440e475a10e9ed46
SHA25613b346eafba284d2561730721050fd80953be7230c892de606e9dfc2255b7cb4
SHA512cf4ed924ddf1268cbb4d8f525edd60aa228e725115267fa3fe9fea8e5a6324968215bca0597644a2c3a34558d751601fb9b763f954e84bd2cc3a465c05899e47
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD511d5bdc96c1e316dd7dfaeb473d6f872
SHA19000a4532eb87b8f04f32884765a8198c1920e97
SHA256fb0cd81103fe648d37c3c9094265b0d66bfab2cffb0776cc497abc2ffe5c953f
SHA51238f71db4113144710d097d009ed7220f10ea8939a114f067d3ae0e5cdf8d4806c1ce03000afd2ea82795a728742876929ae4800342286b9b27c8ca3ab38709d1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD535027d752eda5231aad876972d1c74db
SHA172b597e13cf591e77e9f6742e58b993080400e25
SHA256313d77861182e0a809d1546f0f343ba875fbf1b3a833c5ef019752989c9a0b3f
SHA512afced1148b640929e094c515dfae59024c4693aff868f7d909a9ad3497baabd6fe0298968f3b8dda3df2a1778020fefd113741db3ae99204acbe7fa8aca8ae67
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
874B
MD5e05fc3eeff2c93eda27610b85341a668
SHA1e6e4097dc81104d1df3616314697b31f90dfc7e3
SHA256f119f179d7725b894e26b605c5639881e82e51933c739ff1f3222b9624adba8e
SHA512872e32e389ac4dd0331a76ba3891880d6037a328ce45909abc521ccfeed817ab3ee17a30ccea1971dc925586fea81529201b34dc2181be82158ff953b8a1b5ef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD520cbcbc78ab91419a62f2ad337ec5aac
SHA108dd2d04e7d495956dea1c0f5075ae22253d497c
SHA2567b72cab445bc3dd7dc7cb03b12a1af034b229576cb80a4ef84529fbe2bda46d3
SHA51225f5c808aeadbfe2a5734b45c94b632bf075e0c09c38a2a0919d56680244e322da77e9b9057c7fbbc6ae5c6f105e0cb7666eeab67b8722c75f1384ff6030aa0d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5c095195fdb0591699cce1c44fb748f1e
SHA1e45b63e2e485bb0013eb988ff51bdb0ac9b6c6af
SHA25623c2b59ae7cb9c002b269ec983daa1bab31074776837fdd4ec84aca580e914a5
SHA5120ffa15094901613f30607419d256fa1886fd5266feb360582e4cb1c194b4d5470e32ede5522794e1340fdff71ad4031ef7b70cd2edc70b35d0ec2dd1f6ea6852
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
128KB
MD590bf338271b2d603e1df535f601a93b0
SHA1308f9529f9930ffb45881c9c823e03e75992f89f
SHA2561533f26fbc2640381979f910bb5fe22da70800895559d3bf60097dd42c4f5342
SHA5127f2af545cf09a078354c2b22cc8bff781e0caed0ee4fb4859dff0f66ae458fe66dc4e1335a13bbb7afb1998339bc72898181863cccb79ca104b3588e52fcd8f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_848_XDCHCKSXEOILSCBQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e