Analysis
-
max time kernel
1799s -
max time network
1716s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 16:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com/
Resource
win10v2004-20240226-en
General
-
Target
https://google.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133568100091423605" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3304 chrome.exe 3304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe Token: SeShutdownPrivilege 3004 chrome.exe Token: SeCreatePagefilePrivilege 3004 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe 3004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2648 3004 chrome.exe 85 PID 3004 wrote to memory of 2648 3004 chrome.exe 85 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 60 3004 chrome.exe 88 PID 3004 wrote to memory of 2336 3004 chrome.exe 89 PID 3004 wrote to memory of 2336 3004 chrome.exe 89 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90 PID 3004 wrote to memory of 4168 3004 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefe7e9758,0x7ffefe7e9768,0x7ffefe7e97782⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:22⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:12⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:12⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3180 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3808 --field-trial-handle=1904,i,3108438006234116413,968735537214680057,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4788
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2092
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5f1e64ac52df18ba6c988df75580266b8
SHA194fc8839a8bb7ec300facaf5c72c66ec14b75533
SHA256bb7ed69c5cac0485c0bd0e584e7f9bf1d17dfa2f612283a285250290e9b57731
SHA512ea9f1c4276ae12481cfa039c0bc6ec3030d5449740096ba8d3061ea5c3141574e236de17b038268a23aa0d7d36329b1b84f62b474e35c4c899160ae9d5a10974
-
Filesize
336B
MD52d3b9d7b911c16f5887f59336b75227a
SHA17b1689eefdb2100b2c557340df3c3281b5010373
SHA256af3357018d7316bbc8bb57bf924acdf585fbfa3b5602c318761676449616f131
SHA51286953a5b484dc71950f252d28ac08e3ed7ea3f10aa9474b13d493fa80b309173d9c4f937f6aa85cfa6e5142d50bed55628e7feff2b6dcdeaab654a94a826a48f
-
Filesize
2KB
MD5c24110b5c85dce961bd84909cbd99e6c
SHA12e62e38e43c2284d9a15e21bdc468b8d95eca373
SHA256f863a54d2cb02b3eabd2de49b3c076b7a09f38914a84481f8aac8b8ec67a2334
SHA5123d161e74ce12df4cd085c6b2c2511740f3ee1854eb43b741a8a067755d673f535056eac167fb8e4a9b332e62db0b54bed2572fe73dae883927e0ed001dc14a53
-
Filesize
2KB
MD50637fbe13627a1b78ece03a428e85280
SHA1cb8110a2a6f9fca0a4035fe38d5bacb3909d3299
SHA25641e31af2b9fbb75ccfe70d3f9bdbd75767645435da02e8fd64faa677ee091adf
SHA512b89b7f70c7a271e736fad9f82921bd0dd8e09209c4c64d05ed7be76956791d14032b1a180a96972ac4956cdc74d795a42e776a119cdacf6a711b5fbc4cd71534
-
Filesize
2KB
MD54b8ccac7fb38c4c85aa9fcd101cf10e3
SHA1ca93992fc846e1d53fb34356ddc09d962bb6e8f6
SHA25690e64e67dc37fc57083e3d557cad91530e305e8b5d4564bdb6701ac45ff36bac
SHA512af33ba2c24b8efadf8b78a02872b342d601c2553c8822fdaa1bf09783f8d7e34a5b1e886baebc33767093719b59fd912e24429e6a726298b3332372550670d54
-
Filesize
2KB
MD5de5e5044b56b28e7f21bb67cb3a14770
SHA16c09e1fb7b999747636761a28fedabf21d992a52
SHA256fc0ea98e0e6fd42471715d8c1d159364c4c63f3f4fcee32838a8352f04492ff9
SHA5129ad46f88745a651722e9eb04a64ee2aa41357c5450c1a59b815361ae08b690ff53e643e46508f7ba2a1cd6b82638120a0a31334d28112de010d5fd0963dcce4d
-
Filesize
539B
MD5d65c47233adff9958573499fb4c9d5be
SHA162cb941ab127a74a293021c6bc75af6c3f770c62
SHA25639854bb2aac29843584d9ff971b0b1d12031f6c3db0f6b4e19f2838efb44a4bf
SHA512a6130176046cc0a9f651425364832007b26061cea39b47c0b0498c632bd26724a16e305c0ee5ea386e7b28028395c2b1c79a5596c18adaaa06796366ca515a16
-
Filesize
6KB
MD5416c1fb5a4e74280c4fdb9d3a7d39c3d
SHA1042776868fcfe7a23dd35d060830e8fc1414c760
SHA25663ab7f7f2ccc8ee236c46d359df5331b690435bb8dc15824275287fd18bbe7fe
SHA5125278098a78b968e81554c2df75a500b7aaa194aced6deca4cd47bc716516b492e7c9ff8cdeafaba92b197cb885656e22b66f9039d3ac19552bc6ec050f466b9c
-
Filesize
128KB
MD5d49d7fd5a502714a6437b7b840f3fe5b
SHA147bc04c0a461be3799be1b6a7ca17f7fa7f0bad9
SHA256814f48517341a4d44bda22ae8d2b0f515713b3ef9e6ddae28bc0c18ed25bcc4c
SHA5126c7823abb044fdd68f469fec739c4e3a21e9e6f51d6f4864fa4ee96cf5edbf9df7d8248c2cfecb74f93848d94ad36baac1c3944e4aaead65cfa03d2c21936565
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd