Analysis
-
max time kernel
36s -
max time network
15s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/03/2024, 20:20
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://f872b98d.f4bbe6b3c6a1e295f1dfe14d.workers.dev?qrc=Y29udGFjdHVzQHN0YXJiYXNlYXVzdGluLm9yZw==
Resource
win11-20240214-en
General
-
Target
https://f872b98d.f4bbe6b3c6a1e295f1dfe14d.workers.dev?qrc=Y29udGFjdHVzQHN0YXJiYXNlYXVzdGluLm9yZw==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133552675522349336" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 2060 4876 chrome.exe 77 PID 4876 wrote to memory of 2060 4876 chrome.exe 77 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 3276 4876 chrome.exe 79 PID 4876 wrote to memory of 1468 4876 chrome.exe 80 PID 4876 wrote to memory of 1468 4876 chrome.exe 80 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81 PID 4876 wrote to memory of 2492 4876 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://f872b98d.f4bbe6b3c6a1e295f1dfe14d.workers.dev?qrc=Y29udGFjdHVzQHN0YXJiYXNlYXVzdGluLm9yZw==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ff8f5bb9758,0x7ff8f5bb9768,0x7ff8f5bb97782⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:22⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:82⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1756 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:12⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4680 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:12⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4020 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:12⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:82⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4912 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4640 --field-trial-handle=1864,i,958352896997459767,14061573434211243119,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD59b23e721c49799d18aa076315542d5d4
SHA176b7cf48b20e2d8f6e2a675e263873fdc442ade4
SHA256a2524bed2197e52dce7fc4808b3c4b3e49e3c85d0d0c22c94924a52b7ad3c995
SHA5121154d8b21fefaaebd259fecdc2ccec9daf8601dff2be755bee256c38ce178bf0afeb85110bd43abbc44f14eb7d80b512e428d3902dc1f2f13a67342aa35d4bfc
-
Filesize
1KB
MD50c66d657e303b76e8aeb20dc191d5eab
SHA1cfb6bc23ccfc8f502ac5d37fdcdb1442298e234c
SHA25639c168ca3b8cbc53bc4f717504c77c4728eb3f6d38ffe16aeea4cc8676ad019c
SHA5121e1f7ecc25fda5b64403a029fcfaca6cf95e403bb215f1cfe6bef0ae00b6225ec20a1bc6fc34a07b95ebc02507dc9630029802d378d5d4204fbfad04db6e63c3
-
Filesize
6KB
MD5e4a219213d35e808cb9de0c3e09a32e3
SHA1408ad6ebb193d3cb4a1e0c9155dd28cb8ef818cc
SHA2563e326046e9f4db52f645f9e7409a74513cbc2937699de912008f2fce87df0870
SHA5128a2190c28e8b569f295a6539f52150bb247bfb37d1acffb44d56781aeb2e0e1b28397187a3486d43670da88b4502818e79698b8b7a02fc93b3bf4ff6f07dd5b6
-
Filesize
129KB
MD521a3428fcbabb8609c5454a980daaaed
SHA117f2ae7c3e1b403d8ab75ad0857c4d29098e33e7
SHA25669d510eaffb527538faf8735db9f32508f2e549ff063d2b79c6979f81c214374
SHA5124ea02c7e3f12238db2a7d0e57baeafade6a1b9ec3661830240684b7b0fe8dff23caf6cf85ae2070d52b64c0739753da0a4babdb55a1eeb118a1d4b781503a0d6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd