Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 09:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://slidesync.com/Grk9rDEvVp
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
http://slidesync.com/Grk9rDEvVp
Resource
win10v2004-20240226-en
General
-
Target
http://slidesync.com/Grk9rDEvVp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133570430740975937" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1192 chrome.exe 1192 chrome.exe 3416 chrome.exe 3416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3188 1192 chrome.exe 84 PID 1192 wrote to memory of 3188 1192 chrome.exe 84 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 1888 1192 chrome.exe 86 PID 1192 wrote to memory of 4340 1192 chrome.exe 87 PID 1192 wrote to memory of 4340 1192 chrome.exe 87 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88 PID 1192 wrote to memory of 1020 1192 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://slidesync.com/Grk9rDEvVp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3f209758,0x7ffa3f209768,0x7ffa3f2097782⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:22⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:82⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2816 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2836 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:12⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4892 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:12⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3800 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:82⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4708 --field-trial-handle=1824,i,9191821628549453128,16051122459583408597,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5da9c586f996f126216acf9e469885252
SHA1df80a72d301a3ce4211515938ae526da91142fd4
SHA256f0ddad9645847e15dcb692065bebfd13bb317621cf263f8e5508605c1f29a7e2
SHA5129b3fad37e82059e49a226970f5f0dd733406acb8a1cb31ee8f1bc17450450145c639467810e3450e4df9e2a6277a37700086a72c7f12da5c99d96fc9cca20b66
-
Filesize
677B
MD5a32fd383ddee8b053b2d2579786ac85a
SHA1e32b3cd9014593fc19ce1edc066fa1bc6a54142a
SHA2564bbf01570da9afe9148cae5b55f8da0a0f1ad2f52236cf1a17db40c3821d11e6
SHA51241da8ca7134fedf473eac37e162b2c9f026e46683612ec048dfe024d967a5302f078226d8e40f90ee1c882229bc7f49adcdd68e559d91495a6e15e9168a7b9d3
-
Filesize
6KB
MD5934ebe2acbaf8f371278cd875a5725f9
SHA10f4eeb5bf68050ad09ac126a8f877826313f088b
SHA256080b6e1fdd73bf0af9605754c421b907c3c3f8c7f53f6035810b29a69355418b
SHA512627a6d2e1d30c42e87e0e0ab107a6fe3dcb6519ccfe9a44a5c89dd7394458e0f063ef8bb47e68c9e3c02fec9db018de4eb0a2d1b2a4ba8a2ffbd89a77eba8fa0
-
Filesize
128KB
MD51f2637ce4e4691474d4e97f146a194df
SHA196577bded6c6bf9e9070507e13df9c956f33f962
SHA2568d85144c62e81d58643d6918ebebeb01a44e1d3d1b6e3ada9ecc767064b4d759
SHA5127c402652c3d9c5d32052c9fd650fc4b7003b139ecb55469e7916dcb731d4c01ae7d8e662f7cbbda4db046b3384d53c6364aa5e88ebd1c23768de0e13f4312136
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd