Analysis
-
max time kernel
72s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 17:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://windowsdefender://threat/
Resource
win10v2004-20240226-en
General
-
Target
http://windowsdefender://threat/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133552561956688055" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 5716 powershell.exe 5716 powershell.exe 5716 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe Token: SeShutdownPrivilege 3316 chrome.exe Token: SeCreatePagefilePrivilege 3316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 1824 3316 chrome.exe 89 PID 3316 wrote to memory of 1824 3316 chrome.exe 89 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5456 3316 chrome.exe 91 PID 3316 wrote to memory of 5248 3316 chrome.exe 92 PID 3316 wrote to memory of 5248 3316 chrome.exe 92 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93 PID 3316 wrote to memory of 4720 3316 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://windowsdefender://threat/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccda79758,0x7ffccda79768,0x7ffccda797782⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:22⤵PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:82⤵PID:5248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:12⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4704 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:12⤵PID:5892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3456 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:12⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:82⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:82⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1768 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3212 --field-trial-handle=1884,i,13162091588274087172,4628152634388657403,131072 /prefetch:12⤵PID:5688
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5412
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:2964
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:5716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57b895ba02e055f503d2ef3d23e3edb1e
SHA186f2d2bbfbc9152c4c2745c07a04dda6ad4ee8fb
SHA256bbf645aceab2e3b663590ed0150c8217028084c9702395464897a328e7da73a9
SHA5121d64898bc4da8ef75ffd64761b51c7676c76793677c0a63dc9e8b3f00a6d0196fb2a79c76c2b73d2a1d842bad9759885a9c3926a4a4fd52ff21f4216bb2f9827
-
Filesize
6KB
MD589a51b6f6ff78f9a845811f5fdcbd54c
SHA1057a61f7918e1b27c27643e3a907f862fe751227
SHA2564ef49c534c24ac3ec103226a37af3f5e33a67c2b360ab51220c7a5f4ea70d345
SHA512ed82903a6e8d4322a181df8161d2a58b0d0bc7a6a64540f8070fb633b8f30379c182afd5b6babf69b1452a1347346f3a6e1f087338003036409958029c291be9
-
Filesize
6KB
MD54b7205e33a488ac1e364c8e0294019c1
SHA15c4ef99d6d1c0865f8185cb0b9ab8534297014ea
SHA25644fcadebe4af4488943371247412bbb5fa930d16616a900c0c60366fbb0ec5a3
SHA512b4d5cd54d2c0dca79c8528c0c541361e442632d5d6ea0688b178f41b79b2a2def799bb3c675f264eacde6b3ce288a89af8baafdd5ee4be29dc955801840202ed
-
Filesize
128KB
MD55aeaa559e3a70c5bf95827f97b801bb6
SHA1f84a85fb929b476d9e3a3e3d3847dfe07d2dfe51
SHA256ab0f20d17b55f3dbf6945f457a8b48aef510d604033504dbda09bc2400faff3d
SHA512bd969f4827cecd8a78ca8f856db47fd2c659e21049373c15517c3cdc2dc9633963009e5e04cc8437834aa014fe5baf70be358c7bdf347814e4d2afe9287417de
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82