Analysis
-
max time kernel
215s -
max time network
223s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 04:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shorturl.at/ozIN0
Resource
win10v2004-20240226-en
General
-
Target
https://shorturl.at/ozIN0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133552962727038288" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 1288 chrome.exe 1288 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe Token: SeShutdownPrivilege 4968 chrome.exe Token: SeCreatePagefilePrivilege 4968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe 4968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 1824 4968 chrome.exe 93 PID 4968 wrote to memory of 1824 4968 chrome.exe 93 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 1300 4968 chrome.exe 96 PID 4968 wrote to memory of 2832 4968 chrome.exe 97 PID 4968 wrote to memory of 2832 4968 chrome.exe 97 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98 PID 4968 wrote to memory of 3756 4968 chrome.exe 98
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://shorturl.at/ozIN01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb9e89758,0x7ffdb9e89768,0x7ffdb9e897782⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:22⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3156 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:12⤵PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:82⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3816 --field-trial-handle=1816,i,14452982264300332924,14990584692697028432,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:5324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fef8c12b8ffe07a7bcf7e62a2a5f951a
SHA173b4fe950369345423cb0a04d05bcc56145ab1ff
SHA25669da2d34c84bd402175097cd8fd530c77f14aca29c36c78d8ff23a4b0de4282d
SHA51220fdbe2f46da6057e695a45ee781db742937ebe4886cb0024139e5a0c0c7cdfcd62f184aabe60899c4f6edfd8e2ac1f3e444d9fd8513dd5565a0503a5c22d0fd
-
Filesize
6KB
MD5488815559969688599c0a8af350f6ff9
SHA1c7f4bb919bce6c6d1ede6d69bbfd48edadb67359
SHA2567d9cbfb941f2dbcfbb6aab68fd0f91d1eb02ba8586e60f37b58ea7e0d79bfe39
SHA512b6bf35c51534bcb7c5615de415e181c33f8de038e1fcd5c28a1d5637b8e060de3ee76dab514b853570eff27792db8a0be687e6a6501d004f449947732aa2284d
-
Filesize
5KB
MD538f3dad8120109b8e4449ede951d30e5
SHA1f5dfbd488c049fd4a654b9082b5e5a69de4a608d
SHA256d4976802d5c4a15f87324480983ef62e9293351a18f633a74a5375cc4a8c1df2
SHA5126998fa2e0da5efe68ec6f7861f088701c176628edd041bd0a5ed0e7ece5dfe8f487539194b7397712df1d4e30e8d2c0db6d3f2f7e565782a62b1831b308415c6
-
Filesize
5KB
MD5ea0a2b15afa728ee9e2f7d73c0deffd4
SHA182f06873c997c402edc9a94b775c63d8da4b6be4
SHA256d9b91a23df51073f10aca5bb7f40dc85f8735e2602d8f8e1f92f9a3f3024601a
SHA51259dfd436c3db5648c0b4a317a64c16cf656369c232d64afc0e363a6291bb59088ff91fe5415b77d7459d3c58c415b502f0e3966903fdcf870229a46948241f8c
-
Filesize
128KB
MD54f375ef298d32d91cc5c4f42a7f68543
SHA13b6fbacbfab351ba30209a3e0bbb524a6a42a6fc
SHA256b4476f621deaa71b49ad7256357dddc84634d08484f6e1040ef83cca20fe3847
SHA5125f1b3a9ef4d1121ab977e94b85a59c1253bbd3df00a609896c7c708526674c8094ed614dabbd6179f0c4f1263f8234888dad6c2cdf8d4e639e53a9fcbb58ebab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd