Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 14:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tag.adrsbl.io
Resource
win10v2004-20240226-en
General
-
Target
https://tag.adrsbl.io
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559388920788414" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 1624 chrome.exe 1624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe Token: SeShutdownPrivilege 4104 chrome.exe Token: SeCreatePagefilePrivilege 4104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe 4104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 5092 4104 chrome.exe 91 PID 4104 wrote to memory of 5092 4104 chrome.exe 91 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2576 4104 chrome.exe 93 PID 4104 wrote to memory of 2352 4104 chrome.exe 94 PID 4104 wrote to memory of 2352 4104 chrome.exe 94 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95 PID 4104 wrote to memory of 2440 4104 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tag.adrsbl.io1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb19a79758,0x7ffb19a79768,0x7ffb19a797782⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1812,i,1792184507686390091,11057070598026186335,131072 /prefetch:22⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1812,i,1792184507686390091,11057070598026186335,131072 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1812,i,1792184507686390091,11057070598026186335,131072 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1812,i,1792184507686390091,11057070598026186335,131072 /prefetch:12⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1812,i,1792184507686390091,11057070598026186335,131072 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1812,i,1792184507686390091,11057070598026186335,131072 /prefetch:82⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1812,i,1792184507686390091,11057070598026186335,131072 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2404 --field-trial-handle=1812,i,1792184507686390091,11057070598026186335,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD587c2bda94b1d6c20db5b1cf3a2ba0d5a
SHA18227dd11dfd852e88855f0a716519901d8409ab6
SHA256f1764b32507dbb011d1d122e560abca6893b69525d97c264fdac144b29322cc0
SHA5126a145e209732735075c42640cf4ee64c5ba0a0b22d45b69309b6fd86496833b7e6c09fa725a1dd1d936c0a54902f97fa12ff7662f3ab487026abfc9e9ce7cfc2
-
Filesize
6KB
MD5f92d1bb299900cef08764a5a7638c4c1
SHA10cc9ba28de198acfa58cf4f66de10b531ca05c1e
SHA25621235783f82c0b4635b891e9c48fe6f5e9a402bb383bd0ed2a2173d726030f3b
SHA5121a5538f0ef5e67c9d74b293a801caa7c47c18be50665cb913745a7923debad51cf6f69d91bd10d2016a0d689eac18c883904f350d421e05082cfec6cd9523e86
-
Filesize
128KB
MD5f96bb045b88bbc06c30e7539f671fe24
SHA16257938073f973b9ada468b1765f992d7fc0c9ab
SHA256b87860f991282ffb1b3ba4f24ac17a3aa79f498781df163be3912a63721018de
SHA51203c458fe616592d82de2b9f0a025fc1f4093a399d36fe15375cd5f75d84c4f2b941b1de39ad891285f6984ec1c383354b389d3d6d9ae3b0cb6e61582556b60fa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd