Analysis
-
max time kernel
308s -
max time network
312s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-04-2024 23:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/4kOSIA
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://u.to/4kOSIA
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://u.to/4kOSIA
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
https://u.to/4kOSIA
Resource
win11-20240221-en
General
-
Target
https://u.to/4kOSIA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567483208863210" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1000 chrome.exe 1000 chrome.exe 4864 chrome.exe 4864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeCreatePagefilePrivilege 1000 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1000 wrote to memory of 3428 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 3428 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 872 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 4576 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 4576 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe PID 1000 wrote to memory of 1696 1000 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://u.to/4kOSIA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4ffb9758,0x7ffb4ffb9768,0x7ffb4ffb97782⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:22⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:12⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4668 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:12⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 --field-trial-handle=1744,i,3327390445285779387,6117720962561689563,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5dd6fa6caf9001acdbfb91f7b384dcf00
SHA16ccf3c27e1447bad2e73de3469c7fec24ed026fb
SHA2568c1bd414f5bf8885073863931e19b463ce3febd39d2c434285d9f84644669a43
SHA5125eed63a6de3c4b6d023a5887b10e047876fa94a96de26352c1749f0d759e52d961d0b94969be14b854216c6b6a7b023b641d99b22a7d604d778aee7d43cacc6c
-
Filesize
1KB
MD55eb566de911d9e0a6067c684aac3db31
SHA112b1fbb1278caba2d1e80a3b47f45772e6ecf0e8
SHA2561f56f45f4f8e6db073f9ba36c479b1724148589677e22092830fc7d0bd2e2d2f
SHA5126942830459d880e4e78efa19d4022c31ee0297fc2101f04074595b7141d3ca8ca4aa6153ec28d22c535b6b8af34ba8f78943278ce64aaede4db02f5ffeb4521b
-
Filesize
1KB
MD540fd8171ff7fc13488a7fa60e0975c07
SHA1ae3f1b0dd4e7ac98fb9949be90efa62f1b925a4f
SHA2569acfa5e2ec1b8c4e97ec58e2917b2e98a6e884b063254eca1febc2854afaaf4c
SHA5122a9de1103d682077482c9cf8afafbe3cc81e054846db8e411edcd7f5657a6804bafadd1540664bfe7362fd9b90a0459c7886c0d1d0679d0be22cdab20ac2d870
-
Filesize
535B
MD5c072897604504afb9ac9669d6a3c670d
SHA16f77083931995e81253826a349e7fa85766a37b8
SHA2562e1ecb6d51f3e681c549faa1440560bde3b08df3da7f8bd77e84ea3f886dd9b4
SHA51201710ae689f9821c04de6bb9b119fba372101b183d97249b50e3a9ea936e5d3c000e5eb66d6d90dfb162a7c068a68a0f8d5ddf215ed29b34c7bfd02a6e528c35
-
Filesize
6KB
MD50c877a983b5a56aee5b33de168473de3
SHA1871dca40332f0318553f7ad806872f37af04e80a
SHA256b4b7186e9e8097c9f9d2eff3118f0d961822e06270855ea9bef88a31966dd462
SHA5128f8c277dc0bcba0a053927a7600480bfbe84e3749c5e8afe1017fc76b326e0fe57e3f827c5a1b502f2a083ecbcacad18926c91e4f22030b0bc6d46f65e0f6803
-
Filesize
130KB
MD55c07c5b5bbcfa58b5a91d6f21ea30348
SHA1a3097168e7fd0655d738ccd6cab3ed47605c6567
SHA256c23c5deeddc2266c2125ea1ab2132a6bd66a14480e741c41c1f4229dc01cc03e
SHA512daa7cf93c835eb0b07c1475ed6637c02e012b163153613646d33f3d2095aabc9d869d7bf040afe4c09ae9eadd3d3b8f873c238139b8993c88bc28b1bf9035514
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e