Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 07:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://g.page/r/Cf8ZDK3vEpb-EAI/review
Resource
win10v2004-20240226-en
General
-
Target
https://g.page/r/Cf8ZDK3vEpb-EAI/review
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547893403363150" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2292 chrome.exe 2292 chrome.exe 4116 chrome.exe 4116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe Token: SeShutdownPrivilege 2292 chrome.exe Token: SeCreatePagefilePrivilege 2292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe 2292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1500 2292 chrome.exe 86 PID 2292 wrote to memory of 1500 2292 chrome.exe 86 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 2452 2292 chrome.exe 89 PID 2292 wrote to memory of 448 2292 chrome.exe 90 PID 2292 wrote to memory of 448 2292 chrome.exe 90 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91 PID 2292 wrote to memory of 3856 2292 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://g.page/r/Cf8ZDK3vEpb-EAI/review1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d7dc9758,0x7ff8d7dc9768,0x7ff8d7dc97782⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:22⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4584 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 --field-trial-handle=1832,i,458919608672198309,6577294407198431705,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD56a14d1d44c2256bbe95923d0b3fe8824
SHA1d4fbc45a4767144ab4a50d7069a812ccd37b88e0
SHA2567d7db29c1b2ac5dda7b29fd2c3e071b71103285ee7b89825176268f9e09f2c18
SHA512b794977413e6b38120800185ba658abfbfd72da80f95fce71dc7be9ce85aea7d74c8c65ef41f4b2b81f639c47ddae47b71344845749e38edf5942b4d965da90c
-
Filesize
2KB
MD5e4f7429b6d9d816c9715b70e72c42d7f
SHA174a5e0ecb8074d6bbdb0dac3af06a8d6aca139de
SHA2564868e977079fbad07ac1982eb66f3579cf6bba208a59310b8a9428fecba8210d
SHA51279a572bfeaa965c79bc3139a86814402e842ca240a8025979801ab6acbe41183dbc83080a5f6e69e292aafaed7ca364f88b6fe17a8f5931cc55e95bc4ce187cd
-
Filesize
2KB
MD5e1cd143b1078b9182ee07f2a6024738d
SHA14eda6c7c8a053c20d2aae003fe9ab4601a486948
SHA25625d19001f27fb2f0f87317caf0d2d9152630777e38880b72709b1c7e81348bc1
SHA51294cc94a0dfa745718eeb54b832c728af29dd469769ac1bf6706d7491ebabb6e0105b19a5d9af22d018b224d291079ea225e232b2eb425910a4f87440ad81ce19
-
Filesize
537B
MD5728934631e8fef70584fc8495cb4995a
SHA1125a19630aabe8b98dfa0cce25e78e6b66d03aca
SHA2560959e87bbbb7694f9f9083301c1d73a32130eb0d47821383a65c49f09b1f5a71
SHA5128a64728d785966954d55df3fb55b44e4a370c0eddeb47256363cb01880b21b1149fb339f64774820b22247902615168a551d42f9d374adac32c61292fd850400
-
Filesize
6KB
MD5b1fbfaed4bac3987e42b8b76b4e3f835
SHA1be0759b15623ad251e97e1650129e3c0558de479
SHA256c8415703cded427de9d5b3d5978a802b5350fce51bdb0de04f34618864dafc34
SHA51205886b1219bebff7d44b0e324305d02e68811c5e7f8ce4bc812ddd37d93f5f092a385c532f568f4c613aa9c4cb485506737c5ffbf9acff86db497194cb37e797
-
Filesize
253KB
MD571e730992384d88d3c8ce80ca5956a89
SHA176edd5b3c65f4867cbe348307cd45458d03b2721
SHA256a13b66609ea5595471f0687e5090611643696d591e883ae2dcd6ac9c9e51f5bc
SHA512f4e72828fc61e78459f45f3eccfe2aa1d0aafdf291abf8f4da7f37e4c1239096293e42cf1acf5e1b90e872ae5cebbf9c2013c21f390bed3b7551f201f37af968
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd