Analysis
-
max time kernel
12s -
max time network
14s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2024, 12:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://inst.copygen.org/lt/1125899930099676/fZM3PQu4yc8svpcMKJelu
Resource
win11-20240221-en
General
-
Target
https://inst.copygen.org/lt/1125899930099676/fZM3PQu4yc8svpcMKJelu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133558420418713910" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3220 chrome.exe 3220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4976 3220 chrome.exe 78 PID 3220 wrote to memory of 4976 3220 chrome.exe 78 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 3544 3220 chrome.exe 80 PID 3220 wrote to memory of 4396 3220 chrome.exe 81 PID 3220 wrote to memory of 4396 3220 chrome.exe 81 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82 PID 3220 wrote to memory of 3980 3220 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://inst.copygen.org/lt/1125899930099676/fZM3PQu4yc8svpcMKJelu1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb39eb9758,0x7ffb39eb9768,0x7ffb39eb97782⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1780,i,11938012807647050348,18437000419188986757,131072 /prefetch:22⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1780,i,11938012807647050348,18437000419188986757,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1780,i,11938012807647050348,18437000419188986757,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1780,i,11938012807647050348,18437000419188986757,131072 /prefetch:12⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1780,i,11938012807647050348,18437000419188986757,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1780,i,11938012807647050348,18437000419188986757,131072 /prefetch:82⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5056 --field-trial-handle=1780,i,11938012807647050348,18437000419188986757,131072 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 --field-trial-handle=1780,i,11938012807647050348,18437000419188986757,131072 /prefetch:82⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD51a76495b6169ac5ffda5388e02546c96
SHA150ab204c835328a9e0cd8a6c136ba3ee948aacfa
SHA256768fefb5f4458bb7127f094fb3db67d7e8d8cb0fff3b0b9569805d1b5bce9e6e
SHA512b87f965db365a40cf040afb78a8df5a7e6555431178f81139b803c8831d8323ace6fc3dc0bf2d5c0c18c472f6df3b750cbe7a47a6a37dd65d443b3498d2ebe47
-
Filesize
130KB
MD5883ab235250f756abdd296311b724660
SHA105b68b4db7feace44742a7a74cf955a266310cbf
SHA25663ce34c6a22ecac3896410aed353a846609dfc8c2878adfc0208f73118ef46ad
SHA512df5c49c105485cecc07845b1f849aa10182cb5234d7e40b96dd3a198e9e4856ca012d7e738ba97c9f6bb8bb8bf59e2627e70f98d4ed975a30f3b6167d9b55394
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd