Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 04:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://we.tl/t-Kz1FQencgG
Resource
win10v2004-20231215-en
General
-
Target
https://we.tl/t-Kz1FQencgG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133550362353325438" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: 33 4472 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4472 AUDIODG.EXE Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe Token: SeShutdownPrivilege 4652 chrome.exe Token: SeCreatePagefilePrivilege 4652 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe 4652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4652 wrote to memory of 3660 4652 chrome.exe 84 PID 4652 wrote to memory of 3660 4652 chrome.exe 84 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 3028 4652 chrome.exe 86 PID 4652 wrote to memory of 5024 4652 chrome.exe 87 PID 4652 wrote to memory of 5024 4652 chrome.exe 87 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88 PID 4652 wrote to memory of 5096 4652 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://we.tl/t-Kz1FQencgG1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe7699758,0x7fffe7699768,0x7fffe76997782⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:22⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:12⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5080 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:12⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4924 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4612 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:12⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 --field-trial-handle=1660,i,1416282045079970798,5872839911552033054,131072 /prefetch:82⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1480
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x470 0x4b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56d7e9b179f40429012d2e23c53d8ff53
SHA1dc2d09f62729d9acdcb36d18d438a55deb54a77f
SHA25656dc872519e97bf6fab00ef0d7975177d21751fbab8c45ceb0cb12e22dba1849
SHA5123e75f99bbb383d2447f0f14e5beaea3687c49a4af2a150a68c47099646041d079d1d5b398127bd6efe17a52c2577353f8bac4cde8027ecb7483525fd5c91cac7
-
Filesize
2KB
MD548ee1205214da2a7a5cb291c2730080e
SHA1d9ae6a746b64a4c05be85b617878ac3932afc038
SHA256727ce330180af7ee0309fd15a3298cb7af29020b79844607fd154146e5ce6c88
SHA512577f516751ca444b81ed4704985d564bc8c80a3fb67333d97d1aa93d741d2fb3f4e96dd14c45cb73c7946323d3a98cd3d72bb2ee631d70afe37360748eb65283
-
Filesize
6KB
MD52eff38bcea391164f71b40c5f8af7123
SHA173bc443a5bead645439be0b75fbd68e492da6e89
SHA256b4ba61db1de4997c8e6d90c37f6d56740888d82b9563a7ebb348e49dd14df595
SHA51282f5e0f36d7e66cce8bf6c7a8e1423564a8bce60a33006a99cd3cc0f0bb2e2c6ac844144945d0fb8498e1b096ee036f058658f5546cffe319c6cef53f6c1338e
-
Filesize
114KB
MD53f20febb1b58fd15c6257f9167fd34fe
SHA12447d212915fe2d83e7ddfccf744dabe63638e2a
SHA25693dcd4865cd14a3d3c767a514c17ef2a164ce3e37a8e3f032e6ea38bef2b51d7
SHA512d11f31746ca536a906005dbc070e959a9f0dd916c172adaf93ee5159d52cc7e742645c118e2271fcfd135d9265c5204b136efe8c692e95ef391246ab71a1e334
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd