Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 11:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bitly.cx/lGw2T
Resource
win10v2004-20240426-en
General
-
Target
https://bitly.cx/lGw2T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133597274133315468" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 624 chrome.exe 624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exepid process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe Token: SeShutdownPrivilege 624 chrome.exe Token: SeCreatePagefilePrivilege 624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe 624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 624 wrote to memory of 3920 624 chrome.exe chrome.exe PID 624 wrote to memory of 3920 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 1340 624 chrome.exe chrome.exe PID 624 wrote to memory of 2436 624 chrome.exe chrome.exe PID 624 wrote to memory of 2436 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe PID 624 wrote to memory of 4876 624 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bitly.cx/lGw2T1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffc27ab58,0x7ffffc27ab68,0x7ffffc27ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4120 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3212 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4740 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3156 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4272 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4720 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4948 --field-trial-handle=1880,i,546576531275725710,460037350368357821,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
480B
MD50dcd0eaad4f92c02233b0fcdbfd7dfc0
SHA1207b230dadc0f02c06adc86f97e2091c1ea0f5ac
SHA256f416b6414b738795c378de662e39c19bf17af39bd02bc37863b22c0d8483e151
SHA512fc1162ccc08495a53e969647b7255d9001f952807a6fa5665a6e63486eede23d6e98123e28fd8a35538e1e1f5d3ad971838d40afbafe3361fcfa75bd36f8ed22
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD57c2604c9d4e21c0774eee6426a32ec7a
SHA1e30078ab0c1ee8e16d50503a2e4284fe3d7bde49
SHA256b3cea99f362c1e0c72b7a3e3d18bcc4ca1aec67b6d632f0d24580b11484dabf8
SHA512368a44f3ebc9ce3eb088ec9a939042c2bcd397998703591a23f90e8227a93a19f2e9a416f41af51e5af7498927b57c13b719891ed5624ec1bdac8cc2a4192031
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5d6e42238f34885423baae3cae5784b25
SHA16f1c3937685ab2f0a3880caea87c4d4b199abb3b
SHA256db5b0c79c6d029d8279945c096ee4f9d537a18c7f77c6225aee0c0118616b997
SHA512424c6381dd9e9a7cced5a3947859982193855c6f12258d92dfdf4aad0be2dfb1ae54508b975cf47d062779ba9cafdc82602c4d45f1e7f1cd2d3dfa473c82ad04
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5ff87e240d5ce2fb35f01901f0e847334
SHA1b30f32784c6fe06481de518d214b2086804939cb
SHA2566c2554243991afb95e3b3baf1969fc57572d9a7653b2b1fe09a58715c717d820
SHA51278315fe2f88aedff179fac92ff7f9fa9fba5d99fa15fec66cc44259c4bad14d57c0b32fc3391832d2110a5880434527d0dbfe2f0e96e1359bebc09e597765013
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD550b49603ed992318f7db19194be29cb0
SHA1df4c31764f473ad09693995efe9a0503c2114f11
SHA2564b35da788bdc42f4f949dfa8a55c18bf8f7981874a4f37bd3548a8662692b7d3
SHA5126fb7cf28492f37da777719c393c7ecc4438dc71cb0e07540be074f7d99c4222ca853e61fc833f716eab5b4e0a3f43d44bfd4039a727080c501ea7175a23ee7d6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\d4bc8afd-f0b0-42aa-a26f-be51bd72cf06.tmpFilesize
130KB
MD550fb3c39a2e4b876e58a2f3d85e8c9a0
SHA11cec98f5621eb03e0f2c6655c2d3268c174b63fc
SHA256cf11c476fb5296b69b3f6f5ce925e309fbcadfb05eec3e46facfa1b81213575c
SHA5121b50f8e5c1921901bc6dc62569de35fb487a2110feb56d41bfa221b5aa119ca98f9a4b55dcc9526c31a4a6ade67a64bc7742f28459b6880278044a03a3b9f919
-
\??\pipe\crashpad_624_JBSCFYXVXAIJPRASMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e