Analysis
-
max time kernel
23s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 18:35
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://LINK.SETROWID.COM/SYSTEM/[email protected]&AID=558734599&BID=BA6F4DF2D75FDF0279E25519D748ABA4CA0E87736F33826C28&M=3366
Resource
win10v2004-20240226-en
General
-
Target
https://LINK.SETROWID.COM/SYSTEM/[email protected]&AID=558734599&BID=BA6F4DF2D75FDF0279E25519D748ABA4CA0E87736F33826C28&M=3366
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133588893374481161" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe Token: SeShutdownPrivilege 2240 chrome.exe Token: SeCreatePagefilePrivilege 2240 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe 2240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2100 2240 chrome.exe 90 PID 2240 wrote to memory of 2100 2240 chrome.exe 90 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 1104 2240 chrome.exe 92 PID 2240 wrote to memory of 2852 2240 chrome.exe 93 PID 2240 wrote to memory of 2852 2240 chrome.exe 93 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94 PID 2240 wrote to memory of 4348 2240 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://LINK.SETROWID.COM/SYSTEM/[email protected]&AID=558734599&BID=BA6F4DF2D75FDF0279E25519D748ABA4CA0E87736F33826C28&M=33661⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6e939758,0x7ffe6e939768,0x7ffe6e9397782⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1888,i,9561568495085005571,7859744199488578558,131072 /prefetch:22⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,9561568495085005571,7859744199488578558,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1888,i,9561568495085005571,7859744199488578558,131072 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1888,i,9561568495085005571,7859744199488578558,131072 /prefetch:12⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1888,i,9561568495085005571,7859744199488578558,131072 /prefetch:12⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1888,i,9561568495085005571,7859744199488578558,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1888,i,9561568495085005571,7859744199488578558,131072 /prefetch:82⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bc6aab1dfaf76476c6d973dc7b6872cb
SHA169606a8f4d24f1df86e575dde3463cc3f089bc7e
SHA25690a40f88a3658731adae027821289aacee57ccefcbb646eb975df5c93a433984
SHA512dfc1154514e032624cd5518e6f35e5253655bb3b8e86c90d95e9313d7accd6dc770d412cd4751023985bcd1485e0d34581ad787892cc20708c28a46d72d20d9d
-
Filesize
128KB
MD53d94f0f03fd383991155d2167e86ffc4
SHA152ff0a86451053bc934bff46830e855dfbfed968
SHA256e77be56d1b09447a3f62f62e5aeb3b4538ed6275002508b61cca940120bdd501
SHA5120a9c5a39a64208ec7d2dfcf026d1a81d9ae237369cc866b79eabf520656ebe6ce87f2554f91664da6cac130dc0a5c1926dfbe4dd35fd265972802ec5d1f54e99
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd