Analysis
-
max time kernel
300s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 23:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/4kOSIA
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://u.to/4kOSIA
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://u.to/4kOSIA
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
https://u.to/4kOSIA
Resource
win11-20240221-en
General
-
Target
https://u.to/4kOSIA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567483123604139" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 212 chrome.exe 212 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe Token: SeShutdownPrivilege 212 chrome.exe Token: SeCreatePagefilePrivilege 212 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe 212 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 212 wrote to memory of 4636 212 chrome.exe chrome.exe PID 212 wrote to memory of 4636 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1488 212 chrome.exe chrome.exe PID 212 wrote to memory of 1900 212 chrome.exe chrome.exe PID 212 wrote to memory of 1900 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe PID 212 wrote to memory of 216 212 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u.to/4kOSIA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab4b89758,0x7ffab4b89768,0x7ffab4b897782⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:22⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:82⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2900 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:12⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 --field-trial-handle=1692,i,3185528974087483277,17644354419542070805,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5b89451421c5ffec2f5f739a1fecf43de
SHA11810204cd368c203de201c59faa2bfaf54152b17
SHA256a5ffc2afd531153a31e77e9f9db0b92a6a17baded63876286f308509baf36dfa
SHA512c1a363508de4af5fa9dee088ad86c5b5afb707740c5ba20e2e2cfde43ddba9b5ac81ad485869488998e5b096f98d3b780d66bec4cbd765643dedff54a4431ceb
-
Filesize
1KB
MD505823593f9f9ea2b4cbbe3dbaa3bcd56
SHA171bff067b95d8586d64c0f057fbb263a420d2c9d
SHA256b73a8b16669680af7b424b8d13992a48eccb3d40e7a138f34be947bd056b5f8a
SHA5120a98be08e0b6b6f1f19d9b129c7e5f15bc2b626f3350d9c38f2c7dd4ed744d59ccf96a81ecc6bdf5527d90af9651ebb8990531322d38d42f3e597acfff4309ef
-
Filesize
1KB
MD50a354ce6e7899ad61977444974d3d6d0
SHA122fcea0a77772f57ae1d5c1a54d8a6ffde38fb99
SHA25611bd387567910b929c46003f4ad6834511b3e66353750f1139b4a26c82b10557
SHA512b3c7672571f16693e37d9b27339642489c2a536a8508fd590c70a5f3b57945c3733933fb7a94bb9c06c220c2145645ab4a440c8e9de0fcf326e40595c3046fd3
-
Filesize
537B
MD5121d4bd6932c348226e27510e4cf9e8a
SHA15fb95e8ccd6a528304644c00e7d3b63e70a0fbf6
SHA2567def9c0ea052ea4404464914eced1284ef3eb3b242aa5763f6f1a5b3a22f79a4
SHA5122045924363fac9d781aca5f74bf8678000f446b6c631638d381bbfc9293f2dbb9f291c727c170c40e5179f0b12762c7ca19e6442eadf52d3b30e2795b3537def
-
Filesize
6KB
MD57036a6a27c4d3d5fda79ccaf36054ad7
SHA183dbf6d4e06e7baa004206df09a088c9597a0a38
SHA2565f3367441f861c936412a773b6e30e36fe0d339845d062dd054c115ca7eaa1e7
SHA512f5b8d442d569cc534defeebb68b27df736dd96c933063a9166c9c03a258c12f065ff908177f284f32ad586842c59550683862e64eea5a6883a7cf86bbda48cfa
-
Filesize
128KB
MD574da19618a9e2232d0675e818c6da79f
SHA1ee8da24000225d79e8695640625d8434434542e7
SHA25641ea248c077b49f1c711dff0e1cba06a62e0be898347470de3638abf9701d7f9
SHA51228a50353007c84e1d965c5d235c9c22565e466f5de426da52515b71c7c899f2fdf9d982f0180ee2ae80cf17325187258c88c6e289e7a693373424251baf70142
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e