Analysis
-
max time kernel
300s -
max time network
292s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-03-2024 14:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/presentation/d/e/2PACX-1vSZ65uEVSc3azwoO0r0z_C4FVUyUel1MIWVMltLa9SG6-c-K3ggOZ6it8kwckZOuYgL6kpDL1a4mK6Z/pub?start=true&loop=true&delayms=3000
Resource
win11-20240221-en
General
-
Target
https://docs.google.com/presentation/d/e/2PACX-1vSZ65uEVSc3azwoO0r0z_C4FVUyUel1MIWVMltLa9SG6-c-K3ggOZ6it8kwckZOuYgL6kpDL1a4mK6Z/pub?start=true&loop=true&delayms=3000
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133552458941142734" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 2032 chrome.exe 2032 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 5080 3908 chrome.exe 80 PID 3908 wrote to memory of 5080 3908 chrome.exe 80 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 1832 3908 chrome.exe 83 PID 3908 wrote to memory of 3920 3908 chrome.exe 84 PID 3908 wrote to memory of 3920 3908 chrome.exe 84 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85 PID 3908 wrote to memory of 3724 3908 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/presentation/d/e/2PACX-1vSZ65uEVSc3azwoO0r0z_C4FVUyUel1MIWVMltLa9SG6-c-K3ggOZ6it8kwckZOuYgL6kpDL1a4mK6Z/pub?start=true&loop=true&delayms=30001⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff62ef9758,0x7fff62ef9768,0x7fff62ef97782⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:22⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:12⤵PID:72
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2336 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:82⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 --field-trial-handle=1812,i,15624812303675977137,9604755563166058954,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD534784d57ea1aee07ca180bc7c7d8cac7
SHA18f641f148020e9e93a8c3ed41204bf4a2f50a113
SHA2568bd7bce758422512fb26b3e2e6d7aa568d0c51f817a5d6dd833b2840de8382a6
SHA512001cb5cb39935032174d4125e825c79e5035196c24b878bac45036b4916af68fe76f8edbcbca5b64827c0536dcad2063741c616726cb43b44efa0e3a916fb104
-
Filesize
2KB
MD58c9b8c8773cfe06ef0d9106f341fef60
SHA16824470dac580257c0b39f78a20811c248f154ba
SHA256d79b294f2985e9731ae7a58c687849b1d6682131d86b24a8d89c32d2b0beb4c3
SHA5122cf966e6a18aabc18c704f13cadebb938fe79d5452e4cf141685151d499d446b5c0ef0db6d8dfcefa3df0b87aa1a8e79cdf2c04e60a38ba9f584fb22f8419524
-
Filesize
2KB
MD5a10b8c34c4454ae1c6f298b65e24933d
SHA1e4971fb7684103c002985592337d363b7998d9ed
SHA25630bf11a26b117886c75cc6675e13aca3228bfdc714025ad59c830cebffbfa918
SHA512c3a79570a68094e263fe34d6e16ff90df2b8762d596056cee6eee147011238e803a13d81c8ba0fdb518acb6d1ab4459228534fdd39d8148819db483c44147bea
-
Filesize
2KB
MD5b7e60ec8f32b83620b4167954c9845a2
SHA1540edf724706a2e5c2c8cca6f1013f5189103306
SHA2569c0b886270158761f3258e12fb96e721787c92ed01cbe67675b1ee55ab33490c
SHA512223aa575fe59ec5cc9e2781677ea83610416e3f02a0c491d22dd78f8b99d36cb8d6398d5bfb4a2659eca4bc3eff4d289814520f707bfa3e647879289763ba35a
-
Filesize
2KB
MD5c7951fb5dd4fee5ab64e2b41a40d37da
SHA1d20c494429e1601bc81aa42080386ca2e900cbf4
SHA256d2a45820ee7631c32878ad9efb76bbd7b75353a9a34439945a57cc4f30ec57c8
SHA512ed79ed4ed74b23085ae2d5e2709211950f0d81974963e9f54e9effbedcd06ff34fcea1383fc60afd89e6f5d1e2e64ce587b3ab5f22cefabef94a133060845fa6
-
Filesize
874B
MD5ccdad595ca4de0d97d9e1fb9f9da8847
SHA199e0c145bce9159d8044f4890c760944d50cb632
SHA2561960a79b6a01bf37de5a363770429788c7b4fda1cf329aa86319ba5bf0c2fbec
SHA51295e37d2724312b956769152cfdfdd7dc2457f56457bf2db2f53c59b18841e1d6e5a56776921405e51c586bcf06675399a161cd91381f510be9d38e9e97e42d89
-
Filesize
6KB
MD564424fbb7d0cb5e68946c0712d7cdb28
SHA12d9fc1716ff7cc12b8a9e69b85131ee048a72c54
SHA2561c71f5ed7fff84b570d2352f16fb18336b90b27550b3979b71aa5e1391fd4ef8
SHA512bb3cf416f614cc1ace1f4a9f9b8b5469337890e33d2081ab46d44c92f06064ad72cc8a57703fd05fc7a747eaa7be8cd7ffc84b629a731076ed6ff8a97a9d7513
-
Filesize
130KB
MD51794f6ffdffca713f6ea13d8663ec23b
SHA1f841662da05dd063411431237e51d136776e614f
SHA256c4d5cc87ae8a71290ddd746733276e211eb9d0ab9abc47955b94865c8e7092dd
SHA512056c821fcdc0d372511dffda12b0b1d1b840e87a4fc0b6bef2311df1c89dcd552e06178263abfcff48079420aa3cc260348351acd256b7beba500ae1914ffbc3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd