Analysis
-
max time kernel
599s -
max time network
487s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 12:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.ly/Dol17
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://t.ly/Dol17
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
https://t.ly/Dol17
Resource
win11-20240508-en
General
-
Target
https://t.ly/Dol17
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600784872147424" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 396 chrome.exe 396 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 396 chrome.exe 396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 396 wrote to memory of 1964 396 chrome.exe chrome.exe PID 396 wrote to memory of 1964 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 1784 396 chrome.exe chrome.exe PID 396 wrote to memory of 2464 396 chrome.exe chrome.exe PID 396 wrote to memory of 2464 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe PID 396 wrote to memory of 3716 396 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.ly/Dol171⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb5336ab58,0x7ffb5336ab68,0x7ffb5336ab782⤵PID:1964
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:22⤵PID:1784
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:82⤵PID:2464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2184 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:82⤵PID:3716
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:12⤵PID:3108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:12⤵PID:4656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:82⤵PID:3684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:82⤵PID:756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:82⤵PID:2284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1908,i,5161467229166898244,6532459885702398957,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f5ae0cb0e595f202e2e5e4f52efa7c0c
SHA15452984aa632f47c7dbe3cbf573f3da64424d941
SHA256202fc2aafcdb807d12ade34b7712a52b43a322328f4a8fe16a060ca191c9360f
SHA5126ee40d16f234125530ae6b88ae320025b728696fe251bd781d798bb8ce296aedd6d8558e890eec20dc4a101da9ff1a4f1974e742bfa235201b532ce02375a16f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD51b4d0a3550d8d6a538a0e9a3731a2642
SHA1836853c295e21958dfbb8e77108bde5c36603da3
SHA256b8b0839df77b2f3687ea56eb150e7ee405f8d660bb63d0e059208e16c1792214
SHA51212c6cbc7a6bcb5c9401932ae31c3d848d09c304bdaa010a62c9f4775c3c2a54807a091342f6dea11a514ed41c0836e0a52176f36394cd61692ef1211783dec5a
-
Filesize
6KB
MD5658ad2336650b0d1c3be1c7905ba80c1
SHA13a2526b5c781282b9728562092f0d0f98f3c56f4
SHA25627cc2176ded384a867d3ebd14534cabb5e3db4a59377130c81117e0f09d6ba8e
SHA512949b2ba47c2df40e51960a1fbdad1e007d704dcf7e59453308a1aff0fdf3cdfb7a027ab99bb225830f84bbec8e59c13a92adc43387e9f1fd1b6716f782b3c74c
-
Filesize
129KB
MD55a07af726bb553002ea60834a0fb47f4
SHA11b488defabd1639395f0531ea04b2b8a21d6f6d8
SHA256bb2cc21958c5756b263b9f572590836572bac68c1fc2890b9f2e142adfc9d6c3
SHA512db95cf84e95825df2c364ac66258d6f9db8b252dbaefb5b7330eb34670567a2546a97b8c3b91548d61d3316a0804fcd2de3e38729ec65a6822b142ee7132466e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e