Analysis
-
max time kernel
599s -
max time network
487s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-05-2024 12:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.ly/Dol17
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://t.ly/Dol17
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
https://t.ly/Dol17
Resource
win11-20240508-en
General
-
Target
https://t.ly/Dol17
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600785032708640" chrome.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\nje91q.rar:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2768 chrome.exe 2768 chrome.exe 4212 chrome.exe 4212 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2768 chrome.exe 2768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2768 wrote to memory of 1032 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 1032 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4508 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4932 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 4932 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe PID 2768 wrote to memory of 2288 2768 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.ly/Dol171⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcaca0ab58,0x7ffcaca0ab68,0x7ffcaca0ab782⤵PID:1032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:22⤵PID:4508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:82⤵PID:4932
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:82⤵PID:2288
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:12⤵PID:3020
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:12⤵PID:4824
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:82⤵PID:3192
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:82⤵PID:4332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:82⤵
- NTFS ADS
PID:2280 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=940 --field-trial-handle=1836,i,12437221216206079966,15626427957437403811,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58208b46c29213d200a3ca182ecdebedd
SHA1688b264d075fe58a56d06d8121a4e1df815646fc
SHA256ec564590c5d8782c7bfe7c78acf2451524127d34e026452983d00fb227cf9a62
SHA512931d320d815f5ac57062e4be7feda8cdff1afdb5080c1fa71b4b23b9024f41202c1265347a9b8d8e36f177354a7641f74cef6258240560f4902dc2aefb2a555c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD5ceb71fe34d961083f06d7a2a02eb7dcf
SHA15d3ecf24ad855e0426a3d7bb33966b5d46f9e673
SHA256cc865c9036eb769a1a6e1bfd22223198e6659f57588fe7790853db145a63c5da
SHA512397a045a47aacb416d71eab75f4d575fbed67deff7c0d30f84705dab84a82061bf91972defbf93ea3e32af093d31063f252716b365f429943771be48ebcdba06
-
Filesize
6KB
MD5898564807d9d8e09acb57c27ef6ad8a3
SHA18756fa203f86f0b8cb2dd2a77ecbf6a4be972fd2
SHA256d870b15e8b757fd8bbafe0f2291e44943fe94df0279fbd33e26e944a383ca39a
SHA51292b54b21eb8f5216a904add24514a2cce37d59e22fe25388b35eb396ca9fbe0958655c7a7ad2ab43eefb4a1e8850eaf3cf118fac84ee259d3de50cb6d3910d21
-
Filesize
130KB
MD55511a0de170e4bf02a253fefc3ab6253
SHA1200f160f83a2515ba6c718810bc14415a1bf7855
SHA256247c54951bb0fb31afd4871c71929f15d34b66cc3930d0cd47d53414d82a5111
SHA51238434c1403d7e636358b99b0181eba09ba59022c28cbfc9a834385ad9f091327a5a74cf4ff1d621859757ea799fa7bbdb65734c20281ded43cc5a85cc5527aa6
-
Filesize
71B
MD5933f664a13a368913b12c35fadbe6071
SHA1cc388fd9dae641a224ef61b7983a325d832b74ca
SHA25691acc5eefdea89c1fb6ec28a7f85f2e37f80b64f989761a27eebf67183ecb760
SHA512a9138f15ec0899cb0a14b2b3c128a46f012a437ec0d91aa7049c4a62300aa5f9a3ec400624580e74bcc5d1ace74e8c5e0f3c134c83e09980c07802d06697f9cd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e