Analysis
-
max time kernel
63s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11-04-2024 16:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.it/url?hl=en&q=https://www.google.co.kr/amp/tinyurl.com/2r9rcy33&source=gmail&ust=1712911511625000&usg=AOvVaw16mdDKc8pyVOOFOoz1_8w8
Resource
win10-20240404-en
General
-
Target
https://www.google.it/url?hl=en&q=https://www.google.co.kr/amp/tinyurl.com/2r9rcy33&source=gmail&ust=1712911511625000&usg=AOvVaw16mdDKc8pyVOOFOoz1_8w8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133573264084877291" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe Token: SeShutdownPrivilege 4144 chrome.exe Token: SeCreatePagefilePrivilege 4144 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe 4144 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4068 4144 chrome.exe 73 PID 4144 wrote to memory of 4068 4144 chrome.exe 73 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 4876 4144 chrome.exe 75 PID 4144 wrote to memory of 2624 4144 chrome.exe 76 PID 4144 wrote to memory of 2624 4144 chrome.exe 76 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77 PID 4144 wrote to memory of 4524 4144 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.it/url?hl=en&q=https://www.google.co.kr/amp/tinyurl.com/2r9rcy33&source=gmail&ust=1712911511625000&usg=AOvVaw16mdDKc8pyVOOFOoz1_8w81⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcbca49758,0x7ffcbca49768,0x7ffcbca497782⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1852,i,13764876357013012268,5400049092024996680,131072 /prefetch:22⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1852,i,13764876357013012268,5400049092024996680,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1852,i,13764876357013012268,5400049092024996680,131072 /prefetch:82⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1852,i,13764876357013012268,5400049092024996680,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1852,i,13764876357013012268,5400049092024996680,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1852,i,13764876357013012268,5400049092024996680,131072 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1852,i,13764876357013012268,5400049092024996680,131072 /prefetch:82⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4960 --field-trial-handle=1852,i,13764876357013012268,5400049092024996680,131072 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5ef646b1a60fdb42c16a22ccba162f57c
SHA1da583fa33ff0c92f5bb603320e85f2d248662a29
SHA256ae1f13ba263da3c9a9131a1b18a054ced54b382b0832968694274cfbdf2d1674
SHA512be5cad73df16cf3a29329f9c83a8dc6ced3f8e4b0ee67ed04ba8c3b25961bdea11dffcef2d25b9af6ecbc41f64e4b862f7b5aa60a74302f10d57223bdf5db88f
-
Filesize
1KB
MD50bd1d887f0a20c8f2d918ce7db291741
SHA1bf352af7628eed5e1228eab0188a24d9f6b5f738
SHA2565c69c2aa59975c67212c5762c724c17a14ee78a1558d561a8b7207da0c17599f
SHA512b91224acf546e1b9e4b3e33ac102e9bb3d37992b563fa4425ac6934a1cefa964fe4e0ae1cc39813a2b8f861a5d0ec963ae8c6745c6029b0b1463b714d8066494
-
Filesize
707B
MD5b6552d1341929d30880b99baa8b51971
SHA1ec78b7296f62fcb098525fc4deed303e363a52cb
SHA256563ca5acbb074f366927d78b6eedb6a64e12d690bae8981bc223e818de589a4a
SHA512e84772f3bd8ffcefbd98f273c9045e144f5d7a583118a069de5d8883605575d4434560dc8cc979416ae27de74790b8ce1b36781915884928f616904ee1fcdc5b
-
Filesize
6KB
MD5168f631f86cc92603790b9b9f194ddb2
SHA1a96ddcae1f7837bc186370277c472adb3fc0865a
SHA256b40433d326b9c6d1108995e811edb13f46755e49f64d9679372c5d428ede67de
SHA51257be378021f4ee79ea3fd86acbbf94cc023ab7a5fa07102c71499bb4e87f1a81d7b71cde6abcfa492327253e17efe527a09e529081ed456cf0da39a897e96cb1
-
Filesize
5KB
MD5d089667542c4490ea326362f22feb760
SHA15d078b7aa28d4cafff912c5319f84840ec50dd6a
SHA256ab5d116eb64df89dac838a3bfbe047901565210e42c875200bbbb8dc01f9c60d
SHA51268a4589a123cbd14cf8fa72fe6ca40f7f2e1e9556b2e715e96526cbef7a681a8eaec523f01cbfec05293ba0be96193bad688228bb7d55bf8846e579bc282fc8c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e88859c7-4904-44e0-b83c-ea5c19151d6a.tmp
Filesize6KB
MD5e58fe3ffc4c30c4f6ed79729c40a50c6
SHA180c9c105f643466a39be1ee01afc8df5e82a36d7
SHA256c6de94ad368bfc266e0704fa89ae0c9a462564c61413df3a78302a44775c0a79
SHA5124abb0ad298cf481b3a9ec4a2f6a62bf74ca74c98f9e06d017eb54a4438dad31f9c8b2dd129da0f60893c86b751fa3b0cfb0d489ebb81b01958f5a778f3571e68
-
Filesize
136KB
MD553bad47e2fc73a3460494a02daeccea7
SHA1d0368f5c3f5af54b95b37a3f4ad9967e3bc58061
SHA256c64a1da67b72c77cfd088e99d7e55910147a2f4e78217cef7d782b4146725337
SHA5125b7d35975f3a05ae5a09d3cc01cb1c0739267b78d7b8c7e459edcf16a7724b6144417d87e3f52fa0648a9d60c878492e2fd40dd4ea54e7d99c64637e54c82fba
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd