Resubmissions
19-04-2024 15:29
240419-sw4ecsgg4t 519-04-2024 15:20
240419-sqvv2age7x 119-04-2024 15:18
240419-sp43baff44 7Analysis
-
max time kernel
40s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 15:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chromewebstore.google.com/detail/save-turtle-tab/cjbclahodcgffgpcdokophcaeahpjddj
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
https://chromewebstore.google.com/detail/save-turtle-tab/cjbclahodcgffgpcdokophcaeahpjddj
Resource
win11-20240412-en
General
-
Target
https://chromewebstore.google.com/detail/save-turtle-tab/cjbclahodcgffgpcdokophcaeahpjddj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580135721411807" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1720 chrome.exe 1720 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe Token: SeShutdownPrivilege 1720 chrome.exe Token: SeCreatePagefilePrivilege 1720 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe 1720 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1720 wrote to memory of 1568 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 1568 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 884 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4772 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4772 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe PID 1720 wrote to memory of 4216 1720 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://chromewebstore.google.com/detail/save-turtle-tab/cjbclahodcgffgpcdokophcaeahpjddj1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9015ab58,0x7ffe9015ab68,0x7ffe9015ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2148 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4244 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4432 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4456 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4616 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3076 --field-trial-handle=1900,i,8555976465563218813,10468252166197025461,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
384B
MD5d5ea9c7f9b6f21f5ee6c58b878915b80
SHA1a11f7e831ed1561ec2907a4697c9325324b620da
SHA256b5cd2bfd4697a04e2cea7cee0c4180f401d3d04e16d1da995b8bbbb745b4a851
SHA5128a784f01a19c3b092e351fd1a700b7e7bc33530fe943442fdbcca11bab9310cdb1f4ec0b06f947b25168ecdae381aa029d8a3d946961b2ed642f08fe23e7d7d9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
690B
MD5e9afa4a1a1a1a9320f9edd271eabd487
SHA16901333be7dfea4fdf86084cf2c3a25359acfe1d
SHA2569e58cb4643084d9637bc94d2fe88d3d314468e96e2b43df5b1e4feff484706b3
SHA5120172bd6f270ca380d70b4d0dbc0bec3b28d45cda8bcb34e04df23dd4a70d6252300996567b786b456e08ab5c3333b094cc32f36a3d8f0f0b4e626594b939514a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ed0c06f2-5255-45f7-b9cf-653e31d65f32.tmpFilesize
7KB
MD51ca97baea418c876b5b84da4213d6cbd
SHA16b2822bb7e67478c65e94f625a2ab5e31fc842d3
SHA2562722507963db9a851be66e8bc21099b1d92a37f9d80d2ba927ea4833f2258dd1
SHA512345f0319e916a7936afaef173fdb2809188a50849765b782ae03629234bf5a4644cff535c77af6c80ce4d075a18d9d23166b79d95a02bd51d1dff848f9c15d3a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
127KB
MD5579d3ff3b12f635d5987bde6ed6a3a31
SHA145ae90528654e9946b2b90c32fca07095bb68655
SHA25600b5c924aa517fc564e7a98eedfdc853964e5d4490e1fcef6ef41d5fa5d76326
SHA5125b586b378ffc3a4700b8d15bee2588240c6392746ef8ac7a952bc3a166c79b9467c16f00b71b5c20dc4069b77305130b8ff58489bdf7a634eba43085e7f7d1b7
-
\??\pipe\crashpad_1720_NPBCWINLPBAUXWYUMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e