Analysis
-
max time kernel
58s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-es -
resource tags
arch:x64arch:x86image:win10v2004-20240226-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
11-03-2024 18:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wa.link/wzk6oi
Resource
win10v2004-20240226-es
General
-
Target
https://wa.link/wzk6oi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546565158104839" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2276 3016 chrome.exe 87 PID 3016 wrote to memory of 2276 3016 chrome.exe 87 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 4704 3016 chrome.exe 89 PID 3016 wrote to memory of 1748 3016 chrome.exe 90 PID 3016 wrote to memory of 1748 3016 chrome.exe 90 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91 PID 3016 wrote to memory of 1740 3016 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wa.link/wzk6oi1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff994789758,0x7ff994789768,0x7ff9947897782⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:22⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:82⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1784 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:12⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4584 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4772 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1876,i,18394693723464813124,18261225623354015785,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5d17b949b1a09c8c84cb9c96520fe47af
SHA1df25941f29ccf8f904f88e2ada88d9aabba5f500
SHA2566d7c6ac17c22b9e5bda0bb78f5f252d7d17dd3f097b516be06099b7bbbc67be9
SHA512858640954f37053c26a2d5c7f288858cb1eec75771d546c71d0fae748d02487c08eb6804ed226ef97297b448cca0509106308d01344b8ece90da219169c18813
-
Filesize
538B
MD5d321356c891367d823a7db42d27c8e5f
SHA17d154a8b6afb223a9a8bbda07d3a012d2ff34f7f
SHA25698d38650665a9277198f10c77f92227039abd605f46de3656cd8967d4dcd0559
SHA512f4fe4ce25a93ddc64b9570eefa9672dd555c47016ad616617e9921ee86b69676503501701a394d56c146b4acc5607bfdfc9af0e55f980b18a797cb36e286f9ca
-
Filesize
538B
MD5c9f1c61236479d466e334f052ef4e393
SHA114d4b72048bad46c24ad855515f6e46ac31d71bc
SHA2562482d34baa98d4f61a6e0738e7d62b836658087e45e0a5a0ccbdf73902411520
SHA5120995c94a371e5a50823de235b24f005bbb9eea44c65cad3314feb8ee23dc6b1e40600ca45f7b12731064030e48f646cc1275f8dee0e429cb4ea70d2a7765362c
-
Filesize
6KB
MD5012c8110a7db7425a44df061d77a671e
SHA1e3b5c03ef62b18826748a5e9bad99d17a1a4568c
SHA256e11cdc5c7f521aeb367b5215ebfa90ce98a7d4989c7c28c412eb623d9c3b60b1
SHA512cc9eda2f83bd19069bb3a5419c53875614ef962ea8217ec3fb6f453c8091aa55213af8c5c4d37574bc33768363750986f169975b55aca2340ba29d50a26e4110
-
Filesize
128KB
MD5b6e2fc91fa72cc69e6796022d0c2c203
SHA11731fe623cefe027deb2a5a737e8b9b48664b893
SHA256b4a80cfff6d2b3a030b0783349007f64d6a08220875c3389679e829864924191
SHA5120054259b70810fa1cd4e83b63d20f1d5b41c421f6018b7d907b59d4e3ce633f3a4730765904850b6f64d1dc160a35f695fb3ec2a0f4ab7faf173623e95128b71
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd