Analysis
-
max time kernel
81s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 17:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://autode.sk/3J7vYXi
Resource
win10v2004-20240226-en
General
-
Target
https://autode.sk/3J7vYXi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133568106344220849" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 624 chrome.exe 624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 3260 624 chrome.exe 86 PID 624 wrote to memory of 3260 624 chrome.exe 86 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4748 624 chrome.exe 88 PID 624 wrote to memory of 4940 624 chrome.exe 89 PID 624 wrote to memory of 4940 624 chrome.exe 89 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90 PID 624 wrote to memory of 4016 624 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://autode.sk/3J7vYXi1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb5e239758,0x7ffb5e239768,0x7ffb5e2397782⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:22⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4728 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:82⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3340 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3328 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5212 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5548 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3132 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4888 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5312 --field-trial-handle=1848,i,15139533601116809733,7197799377545194002,131072 /prefetch:12⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD586c758adf62fe6e0ddf7424c4b61a18b
SHA15e47ec8fa240731d8c66fb76343bfd6d4f6d9e93
SHA256d221998e39ee66db46826eaf8d423265a8e61ba9f109ed104a5e6ab90abab834
SHA512aba7ceb09bd7d885b751211a51a5d6a633a6cdaeb99b6dfb084eb31efb52af114fd4be38697db5ac1228f28deea6ec5deb240ad20449f979548711f7e8c5883e
-
Filesize
528B
MD532383617a59ad278bde4ba25e2a2d9ef
SHA11747d21b461b18810a35f2c9c5f494011e1146b6
SHA2568160dd7496479019b95a69fe77a4c92bd3be6b0b95665d0ed0a4678e973873be
SHA512dd6e079c0603711596fab8de0fcfd62f16480c7c52f8b0cdf349a12f8d8ffaad4e0419f090793a246d0b8530c3cdc4bbd0b01369d5ac51b94321dab805367bd4
-
Filesize
3KB
MD5e9dc1fdc8c136b67fa49713da6650450
SHA143b89f489d9c5e3f2af7356223f9bddcef015773
SHA256c00cde12bf046d3ef0676917656ac494b960fea060108f9dd98a4c786056b841
SHA51278e0aadc804764c6afaa33573933b41397b5743db6f8645463e0f35071ade4340fefc2f842f8f758de2601b80437485e9c77793adcd53e26c87c429f9ba4dea4
-
Filesize
3KB
MD5c931f30ba8c043234dcd8d474fde63cf
SHA1cdc6d98844c1008367cdb8f590fedaf9593774d1
SHA256ae12267444e792805ee4604fda5707775cdb60fda01c9415ba346fc4ab8055e7
SHA5122951931c61de1dae051e08946569f65109a4ddd00d93b19c568e36fc129283631acb14aee8bb697dbbbc2d4deca7b63214fcb1f6331c164f9eb2bfd86bb430ba
-
Filesize
3KB
MD51a55c5ff537ece9af4be076222077845
SHA15dfb8cdf77b3eb8af3cba0c2f371a15154d2dfc1
SHA256919e5c8495becc8e1be0acc9e701bb8de3f1c52b6378d68a5553e8df1e5e0b8f
SHA512954db5f90f8772827271a7258fc63338685c7180ebbcca27fdb72bee51fea8b0e32dd0b0283b7c76cb5e8f165964b17ba7a6cb614d766a5dda3edbbbfec11827
-
Filesize
6KB
MD520780096267c44ef7be8a93428a05f7e
SHA1a68cb02132bbc2cebd72749a3883eb0150b028d8
SHA256a4fa4a1a49907bd4702d79369a39ecaf6be8cce540c6ba1e5e39a4146f65ba2f
SHA5120ae046e7339d87a934d94e975ecf0212af4b047c797961ed7162cbe3ccb144858897a24838f826cff8693ff48d0ff1548ef52fbf5371ac0aa5518d3fa8afe4ba
-
Filesize
7KB
MD5d746974449edf60e53427e05ab470335
SHA16665a854b65a919d5c0878dc05c8c8e41cecc758
SHA2567adfe5964ef581316bb19a98ffa9cc2670d179b95a0c2d69ddd488c8ac9d1839
SHA5129787015ab0b71b4269219e777b72ee97c57dc4a8e37dad5c11ece0aca88cc19436243d87973acea69b2c1b189d837c88c3337fc4e88c626c5d41cf837deab132
-
Filesize
253KB
MD59095769ff4718dc62a0a1e9a1058cbd1
SHA1587f47099408ccfa5fbb078994d217385a125818
SHA25635e3b7bcd0fa2cac0a4bbf1157168f2d519e7bfb41720ea6f508a6fe7bd0d5d4
SHA512b96bdf894e69940da37fd1aaea7c34097f5e5bd6dec8579b3985ff1c6d60bc465d78da39bc3cd0dfe1ee5750e539740d006a41b374dddba1b6cbceed20482cfb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd