Analysis
-
max time kernel
19s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 21:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.ly/WikHz
Resource
win10v2004-20240508-en
General
-
Target
https://t.ly/WikHz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1996 chrome.exe 1996 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe Token: SeShutdownPrivilege 1996 chrome.exe Token: SeCreatePagefilePrivilege 1996 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe 1996 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2028 1996 chrome.exe 80 PID 1996 wrote to memory of 2028 1996 chrome.exe 80 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 4544 1996 chrome.exe 83 PID 1996 wrote to memory of 948 1996 chrome.exe 84 PID 1996 wrote to memory of 948 1996 chrome.exe 84 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85 PID 1996 wrote to memory of 4908 1996 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.ly/WikHz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c506ab58,0x7ff8c506ab68,0x7ff8c506ab782⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:22⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:12⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:12⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4236 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3376 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4508 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4920 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4068 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3672 --field-trial-handle=1868,i,309107971462555737,6758510872100096616,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5be61220e8e019b4383dce14cb7582a74
SHA1c9b872b7be07820b43575360ec54739990b44315
SHA25612c076b5dab03d4060ec07bea40bc62817ea6fe736c768a83a4b1c9646f1c31f
SHA5123d599f949925a66620e969d5a16dbcf77128a1182b3412e5edc1b9e23d080eb446efee53c7bb1f8dcbbdd64de37a6c29bcd6ba8e1290a873a49319f592ec7648
-
Filesize
6KB
MD542c33df587b5f91ae5f5ddbd1a43c84b
SHA10b55a4aa2e56aa15b3c7523b0dbce1b8eeb2052d
SHA2560628b81bce44f0b851514a3627d2d597eccf78ce45e1541bb8434e20f12ef4c5
SHA51276d058bfc3f8228c473ad7b5801602b96e36cdb7b3a4ac228672f2c8f3e6e627a097f7ae70ffb7142c18da7bae52508eb6cb029463e75c8ab4c3b467f757118b
-
Filesize
255KB
MD5daa91a1d5f61854084f889013561e897
SHA14de89df2c6046fb0a9450366715b99163090427e
SHA2560f2f794c5b8ff96fdb02a47cd9c063e4448d4b7f339131be323b02279912d22f
SHA512580d7fdb555aa314e2955978cd1793311bc746b72084d0d5a214753f4876735cb2f594833300d4752e31b385bf5fd0eb4b481a47f7909c0e9ccfecce6a5e1f55