Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 10:13
Static task
static1
URLScan task
urlscan1
General
-
Target
http://[email protected]/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133582544029641686" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3560 chrome.exe 3560 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe Token: SeShutdownPrivilege 3164 chrome.exe Token: SeCreatePagefilePrivilege 3164 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe 3164 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 5108 3164 chrome.exe 90 PID 3164 wrote to memory of 5108 3164 chrome.exe 90 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 3304 3164 chrome.exe 92 PID 3164 wrote to memory of 1448 3164 chrome.exe 93 PID 3164 wrote to memory of 1448 3164 chrome.exe 93 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94 PID 3164 wrote to memory of 1636 3164 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://[email protected]/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff97bee9758,0x7ff97bee9768,0x7ff97bee97782⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:22⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:82⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:12⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:12⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:12⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:82⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4668 --field-trial-handle=1700,i,12566665945883135226,12341031887222486380,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1048 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872B
MD5db78a64af95ce635aac393dc901f2eae
SHA15decc9e641096caf560f114d579c2a17dae5e995
SHA25692df5c035ebf656ff5b294338610b28b9011ac6422aab901a99b44604f69a79e
SHA512b9141f668eee6d88859a40572be79f57fa60bf5b0c611c660748e28c9b5a6084822fc65b5dd91de2d3705ae97144a1e578e857bcd6fcc1897daaf8677b38bcbc
-
Filesize
537B
MD505fa147d7e4cc5ff9dcd259ad222ca3a
SHA1f5bacee1b3b46b54c736247a657d393ee80970d0
SHA2567b2606540ee3b465daa031f1eb851e670dd30c8e466edbf012cfba0a0be650a5
SHA5120869ea0a6a09ab7caaa4f866c979fcf31c518e82fd2e7f60d588dd316e2fed1b3172714e8892584bb69825b0dced3a0eb8f8838e56f9472eff9712d4befc425c
-
Filesize
6KB
MD5bbc4afd6c7eec3e122e9279d23a98c24
SHA12c86c985090e86afa3858540f5aace844ede8bb9
SHA2567ce3fcf6e6af22f5f74356fcb52155fc61668da8a1b2aed5c47fc462226c7063
SHA512d92b213466065fab93346a6b6f7e41bf2c89aef87d171012e61cd2c05a9a7cb42837dce196281b897bab32dbb7a4819a035619ce608b50a3bee16f49094e292e
-
Filesize
6KB
MD5cd35afbdda4f471329b98c9be2dd601e
SHA17ba709cfe6990094ccb327e58218b58647c69c2a
SHA256e2526cf759619e08412ecb60879c5242a36a1239d2ff64526caa0a5bfd95e829
SHA512cf88f7df6502fb9b8bc4e4a991428de51956360a3257f50d24c22648a8231a04b5ce90b3e218ab63aabaf6f7d0616868c3fd7407022c8cc6fc08b8075ebe139c
-
Filesize
5KB
MD5bb6aa40f543a84a47208cafe758942ba
SHA13f224e8b9f71c47d1469d9588693c2175e5ee821
SHA2567ad8b69ad21271a08a6d288b85b6883a44e4c60808e801a9f10c0460f475bd9a
SHA512858bbc25a70918383673840da1509580ebfb74ea1cf7850fe75cacec786d015745eff4dc74c38fb11dba8820bad0fbd3af61cb8f97b453a22e3cd09deaebf444
-
Filesize
128KB
MD59cf437314ae9884eab580c1d8465c334
SHA1b207cb111e3d233c3900f59d47993209ebba750e
SHA256d7c9fa8fae08231a104ff2a239a6d701cd74c3167bee8b45e97870ba362fd9f2
SHA512bda62465333673611048925dc26cf5d99ddba10225935a6a951d52873675dc084911440b2b07a8f44a531b18760b06a287f795eee5ee40bdc745d91754735dfb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd