Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 13:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://2d9qokfx.forms.app/brou
Resource
win10v2004-20240508-en
General
-
Target
https://2d9qokfx.forms.app/brou
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600804712652882" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 916 chrome.exe 916 chrome.exe 3276 chrome.exe 3276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 916 chrome.exe 916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe Token: SeShutdownPrivilege 916 chrome.exe Token: SeCreatePagefilePrivilege 916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 916 wrote to memory of 1552 916 chrome.exe 82 PID 916 wrote to memory of 1552 916 chrome.exe 82 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 2380 916 chrome.exe 84 PID 916 wrote to memory of 1724 916 chrome.exe 85 PID 916 wrote to memory of 1724 916 chrome.exe 85 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86 PID 916 wrote to memory of 1888 916 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://2d9qokfx.forms.app/brou1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce60ab58,0x7ffcce60ab68,0x7ffcce60ab782⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1876,i,9010864131572056947,8001618876128884541,131072 /prefetch:22⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1876,i,9010864131572056947,8001618876128884541,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1876,i,9010864131572056947,8001618876128884541,131072 /prefetch:82⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1876,i,9010864131572056947,8001618876128884541,131072 /prefetch:12⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1876,i,9010864131572056947,8001618876128884541,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1876,i,9010864131572056947,8001618876128884541,131072 /prefetch:82⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1876,i,9010864131572056947,8001618876128884541,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1876,i,9010864131572056947,8001618876128884541,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5500b9b7c08ca51a2b769678796364aa8
SHA1b479f6f9b07b8bbf9664896d85ba773856d701a7
SHA2569be494333ed2e749fc6fed9d804868c89082b636b4d85c35e1a4b25db6493a23
SHA5129e62efab37fa737c19820982a8acb2e9796d7314e70306d70c87817c9cfcf0784db0c36bbc55f7e6fe76297ed54bf04b42e4d2eeb5d445cd4dedd6be0355f76a
-
Filesize
4KB
MD55cabed37756af3c4361c479c5012b9c1
SHA1e79ef654798ecd3606bea777ab46921b7d7f22a9
SHA2562807c83a0b4614a73e1786f5ace08faffc2579a4189d77d7197a80d7f03c8a62
SHA5124aa0cd7f1e0af95f656fe27d4a42af1b5b0dc0ee61e12639efe75fe78400d01da9cb34f62e537e8636000a3ba61d720a6dcaa8d418a37338014ee6cf824f91cd
-
Filesize
3KB
MD50ab617bfcb57aea6e2df8ff67dc099da
SHA135fabf0410bd9b994aac80b04fe29050d1ff3fe6
SHA256ace3498aa45f23228ea2320e8f6ffe2c50ff44efa3044e66334d195b5ac47267
SHA512272d7d7e82a58f40baf7d679982c2dc728ff3773f8f53df60fc29fb9b1c67e5a2516815b70abda8a7419a4c2f786b65456bb22b02d0abec4bfe94dda6a5e3354
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5bef81c2bd97d6ce6b75dbad3d10251f1
SHA17195fa47265f150714436b5b3a370cfcd2e4c196
SHA256353941791b0d52bcb2d39eb8fdba7c794de09f3a2cc7d411f37cd7032e3ef2ac
SHA51246166006559a424c21a2eb3823bc12a6236b69f22e584fc43aa3900180869e5a84c3bdb62495f0dfd628a52e584820ee34b864b3b06a909f69d4bb97e1e29487
-
Filesize
7KB
MD50df2236a92066bcb715b4fc3dc155704
SHA1c431deff8ab2ead865b071b47be7cd477c2051c3
SHA256eabca4ca90bce8176a9e7c7a72ac6f7c0a65fe392c00e7fb7184d5425359da5a
SHA5125fdb21f509c62804aa0b504f298861a12a9669033ed26d4eb104600cb8cacef2b4f3e84fa61ea4752353041977c6d7bd85193fbe75d0da01276db0db873a54f0
-
Filesize
129KB
MD57fb29113795f56e5ceee3be8771adfb2
SHA182ba0c0cef6f781c0097cdc46d87da121e8fc045
SHA256d09726aab2a4bbb72aaee49b06b3ec18f1d4ef281e6321fbc454f36f7a5a00a7
SHA5121e2db0dc8397bc14b7b0e1ba48b039ed0fcf46d6102754ab5342a9e5b137ee050cc87145cabceff43c5e62ddf3bd5d1cdfce127323c756af81f12ac6727f42b5