Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 02:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lh4.googleusercontent.com/7OMEo89swjk62sQGTIgfaE8LigaErICXMH2s84PSAkyqmCohK20ZH8hrq7MTwpozKQu5VDuVEMJqBdrERyOW2Z386Esp715vJmVrCA-ht9Mz2dlFwNjXW45cE36DF1K_PR_bkuMUA04E26SJOCEN-d8DTSlLu7iOUkNY0cZ9vdmyqliwmJbHkUAF2CFpXQ
Resource
win10v2004-20240426-en
General
-
Target
https://lh4.googleusercontent.com/7OMEo89swjk62sQGTIgfaE8LigaErICXMH2s84PSAkyqmCohK20ZH8hrq7MTwpozKQu5VDuVEMJqBdrERyOW2Z386Esp715vJmVrCA-ht9Mz2dlFwNjXW45cE36DF1K_PR_bkuMUA04E26SJOCEN-d8DTSlLu7iOUkNY0cZ9vdmyqliwmJbHkUAF2CFpXQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601259310077327" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4736 chrome.exe 4736 chrome.exe 3392 chrome.exe 3392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4736 chrome.exe 4736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1392 4736 chrome.exe 83 PID 4736 wrote to memory of 1392 4736 chrome.exe 83 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 3908 4736 chrome.exe 84 PID 4736 wrote to memory of 60 4736 chrome.exe 85 PID 4736 wrote to memory of 60 4736 chrome.exe 85 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86 PID 4736 wrote to memory of 5108 4736 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://lh4.googleusercontent.com/7OMEo89swjk62sQGTIgfaE8LigaErICXMH2s84PSAkyqmCohK20ZH8hrq7MTwpozKQu5VDuVEMJqBdrERyOW2Z386Esp715vJmVrCA-ht9Mz2dlFwNjXW45cE36DF1K_PR_bkuMUA04E26SJOCEN-d8DTSlLu7iOUkNY0cZ9vdmyqliwmJbHkUAF2CFpXQ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2e05ab58,0x7ffb2e05ab68,0x7ffb2e05ab782⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1908,i,13840829516500421712,374028841891756077,131072 /prefetch:22⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1908,i,13840829516500421712,374028841891756077,131072 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1908,i,13840829516500421712,374028841891756077,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1908,i,13840829516500421712,374028841891756077,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1908,i,13840829516500421712,374028841891756077,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=1908,i,13840829516500421712,374028841891756077,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1908,i,13840829516500421712,374028841891756077,131072 /prefetch:82⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1908,i,13840829516500421712,374028841891756077,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51183d4b7fb10f2c9c19feaa092676f7a
SHA14b928a9926cec568132ef26a85f5cd68ff7fbfa9
SHA2563f2eb70723637fc6cb014a4dc3b9a1c6fc27ec7ad7570b99519b939efc223bb8
SHA512773498d6817cef65b992d8c3dfee2f4be5a291a575086100aff0946895c82bb7264ca59a2b2c729bc2d77d5a3979b09b467b42de1e4da3611188edf2b1d101d4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD514a459d2637313168a0ba7b0f65e7124
SHA1eba046075cb2141d9dffc029cd8b1c0ab8038a20
SHA256e11aeadc66a2735fe5c8dcf592511ff5cd949a535baffae137d5eff711a2ee67
SHA5129b591ad24b88dc38ead403031067de51705f4409bd1afed00aabde23971b2ea702f6d1d0d5d831b09264686b334c95f3bcabc9201eac36d7eca5bbba71c50c02
-
Filesize
130KB
MD585c0b2f908f21c2744c74cb075c81c6d
SHA1ee4bab53e2cb83d1933bbc2f366a4b5e72ffad45
SHA2561104a5e651324dbd0589c72c16be21a500ce058e2ce1720225d3a5f63676951e
SHA5126debc690539436c4a4262b6167ae8eff8e506f6874254be2b43ffc107eafdbaaa434189827e6273cd7eb0986bc4c7c153dbfffcad5e656dd71c5ec76fee0c611