Analysis
-
max time kernel
900s -
max time network
1587s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28/03/2024, 20:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://youtube.com
Resource
win10-20240221-en
General
-
Target
http://youtube.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: 33 4172 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4172 AUDIODG.EXE Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1424 4544 chrome.exe 74 PID 4544 wrote to memory of 1424 4544 chrome.exe 74 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 1568 4544 chrome.exe 76 PID 4544 wrote to memory of 3988 4544 chrome.exe 77 PID 4544 wrote to memory of 3988 4544 chrome.exe 77 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78 PID 4544 wrote to memory of 4120 4544 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://youtube.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff805ab9758,0x7ff805ab9768,0x7ff805ab97782⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:22⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:82⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:82⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2688 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:12⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2708 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2704 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:12⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4652 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:82⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3812 --field-trial-handle=1736,i,8847882103755376077,17319058294890365550,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4936
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD5d6c9d748cdde74dc56ca5ead7b4d3c4f
SHA1d9471520b10d0179a3987a6383efc4b7096c0f52
SHA25673c6d02dc20f786c7e52f1ba2d00b89bbd56bc27c9f0d25e8de164be1e5a1e82
SHA51246c2a68c78aab94d7ecf31d2e69bc1a058edcf55cee7573ba2cfa0eee567fb2df2bca8292ae771df2e2b318aa822291fa965769d8de0c59b87806ab6dd6ee7be
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD54dc0bc45fdb0d9b982591d6872500c6f
SHA18a3b596a46532b564b8eb499432690eb490ed581
SHA2564a7b3c78e334053e033c2b042face41a83e42c1973245b613e1d7c440ff91d3d
SHA5120f9296ae151a1939db1a0f09ee596f7256da6f619b4ecea85a8f43fa5679d206dc2302fe1d58c6eb32af4de4ce39cca0781f9049c39f3b45ed505eea210119e1
-
Filesize
874B
MD56b27cf5286cd45d9b20d6277c9c793a5
SHA14ab27b406a6ba09c6db7250c4637d0e778dbf4a7
SHA2564d196f3c3ada2ce95944f74aaba42b187fe33116da362b3fce08bfb7818fa309
SHA512f076e440f229ec512d0eba206f836f53f876b5024b6aa96463932862f2cb39a30639167968a9900cff7036d3581b27e6a41a80d3fc51cbf986282b2c45fac880
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
7KB
MD538118610e96229c9049740408ab2afda
SHA107f25855a77e2594a8c0313d533b6b395a4e13d0
SHA2562560f4e6d34f9a455a82708b4167d8471c30b9daaa8e277cdc5f9f5db13aa1f0
SHA512a2f6631e0043c325428b94f2a668ede6e494c4fa6e7e390f08f2493bfcec5b6bc3f968af50aa9f36eed5d75c7e01dadc51c49b65c04c084991c802f9e41b134e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e104dec5-2122-486d-a56a-26745134ef81\index-dir\the-real-index
Filesize2KB
MD574e45e85a3607da7c9b6285c177f7767
SHA19ccf0996b10f50765ad5bc9d90919a8caa19a219
SHA256c64ac0f17f039e30f205824f730d5ce8aa1adb860baeebfd80a780efa81c725b
SHA512bfd11aead3948084bacbd3f1a2524b3b434f8d795bbbb706b807ffe8f50fa7a5f519fe3d796ca683bb4b5f52ace871d938c718acbc821188f74d3d92fe13e81f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\e104dec5-2122-486d-a56a-26745134ef81\index-dir\the-real-index~RFe576ee6.TMP
Filesize48B
MD56bf96bc05f856ddba780db40e344a695
SHA1ebeda4fbd2b6b7427f3c82546eb6da617b485b4c
SHA256e339a5ba3fb58581f143fc6994c735ad128ddd3d862cf8febd76db245318ccc8
SHA512143e286bfbf76148a1c2ca2ea94eb7adb4b622cccd842a24a4c0fa8393de1695915e1951b3a944d3dd5699166f4e77a394060efc80fef8b2c12bab84736c269b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD510d70f74f8a0f2261e038112a5befab1
SHA1543cb0f03e5b4a66cf4c0dae5ff2e6e83ee45406
SHA256786afd20484e59919ab2fedae8c00577eaab67b89534625258c3e4faf17afe2a
SHA512e11871473b764e7ce31dcd80e316204a826087fe766e5e76c2aacb87183cc4aecc7fecf6af599c163e2e602561ed8f177c4d5f086eddbdff5732591c405b5c53
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD5aaea6e65ab1245e18da82bc2335c20ad
SHA1088824007c298bcaf27370bf01bb7ab7a23786dd
SHA2564b01de478ea9fae1d252e9294f0c3c28d2ab89d33696a3cb167aa34f91876fcb
SHA51228c77eaa58d2907bf15b423a5c1d7a5d6a5f262a707e976fbd2c349f7ad1e9bdba73d6d7e01156d2f57906c1e2b24f47fbc7e214d1c873f4741f8063b3f0d07d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD5ce3010abbda0aa5595dd83b1a41f205c
SHA1b43322c15441ecf31d2facfdbfc30ab463fbcfc7
SHA256a254818420748b12fef639642c037fa2ce36826b6feae2f001b16e5c14af8264
SHA512612fe439a253859b5882b1bdc9fa5125e03e8f6b9ddc31087881ae1bb480bdda7ac9250a2c31cbf340be761729bb9ea501d101998134e6709d74265976318ce4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe57687e.TMP
Filesize119B
MD50db5dba3996b1eb13f1508be276ca247
SHA1dc1b024eae327212f1cd2854452f6984c3b719b5
SHA256cae0249942dd7ddf72909b74bb3a140f3d47e0a1768faf6934e9e49dfcd8cda4
SHA512bf914b40857b83f6cff2bd4aef5877ea7fb1ec094e82f6276df44c99a04d2e53be4ae3a1cf22987d96262e3c5fa8aea0a81c7a2bdc96a1f4ca62ff77a76e3cb6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD503876f4afc437c607fcea305850a6b2f
SHA1b68ccd3d2ecc6877ca5c9b726beff4d5422334a3
SHA256d02c24eb05120a4409b70d56e8e9434d21c5a5d3b19eb7bebd9535892e20d1bf
SHA51217ca9c9a567fd11dc127dcac0f5e85b19b6cd279ca63cec0026060c7308c64fa7bf750c4e49bca569b0c78a995a10fa99fe368cba7b75b2f3498cd422e67fd96
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe576ed7.TMP
Filesize48B
MD53e7f367f4be73f51c137c8f52a02d844
SHA16656d9ec5a948078fdd88da11b904c29b07c042a
SHA2569a2c90c0b04bea8b60ced3003045fa015a3c771fb84b9604f689b8fe86f10f90
SHA51200b3544959a539a690f1da0cab1dfe9072cd1f8465bc86518db82827253158a9dd49e013835cbc9d25fd0d2a8afee061ef2ff8537e24bf64cd44b70c858a8e07
-
Filesize
130KB
MD5eec1b1c04696257902c37fc05ebd8db8
SHA106e9d9acf1ea38af78308f1d9fd7aa9f49757adf
SHA2563bbb6684a7a165ac51b4110ca220ce2eeb19589ba53dc6bc7dfb1e98610d68d3
SHA5122711d6306adf13f03b66712a57a2cff4462d35c9e86045f33011f1e2cb6da1c763d23e2ca2d9d3b4312bc536332e58820d7d3de58419e82c976deb4b28a02504