Analysis
-
max time kernel
287s -
max time network
288s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 16:00
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.kz/amp/s/liriolis.com/82272/amxlZGJldHRlckBzb3MudGV4YXMuZ292
Resource
win10v2004-20240226-en
General
-
Target
https://google.kz/amp/s/liriolis.com/82272/amxlZGJldHRlckBzb3MudGV4YXMuZ292
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549920560410928" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe Token: SeShutdownPrivilege 4704 chrome.exe Token: SeCreatePagefilePrivilege 4704 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe 4704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3776 4704 chrome.exe 88 PID 4704 wrote to memory of 3776 4704 chrome.exe 88 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 2168 4704 chrome.exe 90 PID 4704 wrote to memory of 4524 4704 chrome.exe 91 PID 4704 wrote to memory of 4524 4704 chrome.exe 91 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92 PID 4704 wrote to memory of 1132 4704 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.kz/amp/s/liriolis.com/82272/amxlZGJldHRlckBzb3MudGV4YXMuZ2921⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb3039758,0x7fffb3039768,0x7fffb30397782⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:22⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:82⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:82⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3136 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:12⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3272 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3836 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2888 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1072 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4700 --field-trial-handle=1904,i,13045709147247331083,12531660562624245189,131072 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD506d38d9bf028710762491328778f9db6
SHA183e1b6cbaad5ca5f6dc63453da324f8df28de193
SHA25691558d69c027808e375e11c80166dc6ba245fbcfce715c9588decc55b4a33dad
SHA512b197e5f92add72688396a07246ee9842a3b0de36508aa57f0254531cb109c77d0392e00ea28e006f9fbab1b8fee9b333998946de47ca7526b631e8c810780781
-
Filesize
168B
MD5b96888888668e5cdf172e94576986a7c
SHA15283c6486c4e8d46e4366694d59f48b173eb4c2a
SHA256f9aca6537ac56c540f185019208c0de8710afcf0658e0d58af158fef308ae8cc
SHA512e76686e5dc2119f46f5aab06a65dde82a4d03151a1c4eca08dcf44ad303b22672b23efafa371125bf7822558b45c8899073ee72502f6afd4c88ce93776c4cd27
-
Filesize
144B
MD5677e0209623cf8d9afc742861eb7de3a
SHA180c1d30b66b7b5a6bbe7f47701f2e9c11f4756c6
SHA256374c5ae315fe925180c74673e55b77ca5f81ad39b81219e44f21755b7627b7a9
SHA5120b2d1cf850247af05a36f5900f3b3908293bdd678c44bc779a59dabb553249bd6b742d886f53979bf54c1565776ad14e9d4e3d67862e3d529484a34a48cd0c0f
-
Filesize
2KB
MD5e40648f550598b2a68f6fab7d51c3d71
SHA107e277e1390e72ea00522334f1f9a59eadf89dc0
SHA2566030b9dd1357f1c786158e772d006b29c63d4bab3aaca9d1cf39f44479967bbf
SHA51211df6bf76b98dc849d6c076c0ad39dcbd1bc8aca854a517ab093dfbc01643a0c8d1af2d9b270d4fdb9269e9475bec71cfa3b8ba6dd073442c1128794fb15558b
-
Filesize
1KB
MD5ef2a659b4bc986b31b15027ebdd6b336
SHA122db0be1f890600a2a366e2f5ca0787e52c14359
SHA256438aa2cc04ea99f9dcb8f9a7ffbf2e56f98de478fc5ec21ee2b7b6851f9c40b3
SHA512f403fd380d62d3a08d3deb585d098c6751b794e73ea3fe3a461d39438f80116452302042cb832999f44d08dbc03ee9ff0e8d616092ff7a020f1817beb0cc7201
-
Filesize
6KB
MD534827456a7912880ad5dfc945557ee1d
SHA1087e0c5f99c83099b5c5946cc1cadb076870843b
SHA256dfd9ad04ee752fd2b41efa81e1fd98d32608ee5200a2f9ce13eb7199966d8169
SHA5125060da1a8dce642c79328876cbba489afdc6aa0119d8b3d5f00ce2a00db84bcdc3b4f96f0819afb9484e1116b6533ec83dbbd26332cec90ef357fbebaffd24d6
-
Filesize
128KB
MD538ac821b6e356510dc50f5f57a91c6b0
SHA1c740a6b7e60e70c20eab79171fc4cb90be67bbf7
SHA2568ad27726b51e4356aebbbbed98ea669d7e5b0c6ec179406545d4e11356b67f86
SHA512f1ccb5527092e97edff9df9889e4262708661f89b4e33175dcb83bfda5b5310d246054c297dbb0ad44c02ce806b5ef3739ac33dbba8d0d9c1415d884709d95b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd