Analysis
-
max time kernel
31s -
max time network
30s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-04-2024 15:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Google.com
Resource
win10-20240404-en
General
-
Target
http://Google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133583589418552405" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3404 chrome.exe 3404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe Token: SeShutdownPrivilege 3404 chrome.exe Token: SeCreatePagefilePrivilege 3404 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe 3404 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3404 wrote to memory of 1372 3404 chrome.exe 74 PID 3404 wrote to memory of 1372 3404 chrome.exe 74 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 484 3404 chrome.exe 76 PID 3404 wrote to memory of 368 3404 chrome.exe 77 PID 3404 wrote to memory of 368 3404 chrome.exe 77 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78 PID 3404 wrote to memory of 216 3404 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffba209758,0x7fffba209768,0x7fffba2097782⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1784,i,753385354446173927,8276925653488122103,131072 /prefetch:22⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1784,i,753385354446173927,8276925653488122103,131072 /prefetch:82⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1784,i,753385354446173927,8276925653488122103,131072 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2652 --field-trial-handle=1784,i,753385354446173927,8276925653488122103,131072 /prefetch:12⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2680 --field-trial-handle=1784,i,753385354446173927,8276925653488122103,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4392 --field-trial-handle=1784,i,753385354446173927,8276925653488122103,131072 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2716 --field-trial-handle=1784,i,753385354446173927,8276925653488122103,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1784,i,753385354446173927,8276925653488122103,131072 /prefetch:82⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5b356d838e9b4f141a4e2e373d08ba6b3
SHA1b92900661dc2b8a7fd4b47deb7757fed93a2dd5e
SHA256888d13ff10dc64378d73299a47cc5522af08d73ce29b08da62ba2446c14078be
SHA512c66688ccfc6a96b7ac89234b276b5fb9a87d7d6d0404a2fa6ee5b83b1760d60ebccf285fe89c906df06fb50cef4492de7c3d34a63f8fc115f26a263cf9ef30bb
-
Filesize
371B
MD5c0ea51d14f2b49d024dc237bfcbbc9ca
SHA1360d67b44e58706d28e776d1bb1e6c0ff89563c9
SHA256002b736ba66454121316728fc43ad347d970bb29fafd5a81cb1a421d0e11b201
SHA51296bb5970bcc298826ca15e31353dcd727c691b969bd6ecd914b7c9d8f13249f7df2567899d72a8e96ebe0f3be4bbc598764132701f542740d604d6344bceb2ab
-
Filesize
6KB
MD5d20bffeffdaf3ae8c141440e18b67c7d
SHA1d698fa8686f768d9d1440f2229faf37ee151b71b
SHA2569f39b7a2bd457d89f4dd8487ea289907e3db46a0928cb7acf4c4ce71595c6b2c
SHA5129326522e7e83f6cb3a469f9fc81e634614143ddfdbd8f4bd515665a4f105f8d057cc43593585e2587e87cf537c10c78b9d30a27ade032b6b2e126774b7cab1b5
-
Filesize
136KB
MD5624744a9653b7bf6d69ca0a380eabc40
SHA161971469a5798a544fa1461ac6491ff230243169
SHA256cb67c216a49a736bc166c3c9ca60b9e3de2b69b37c7c1d2a353817d5ab08a059
SHA512fb3cde965cec44365aea744792d50df06cfe28d76e03d6cae7588593cd308ccedc751e38f116df2c9b11785680c1db599caca87923bb33f957bca0bfe44c203f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd