Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-05-2024 12:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.ultracompressed.com/windows-11-highly-compressed/
Resource
win11-20240426-en
General
-
Target
https://www.ultracompressed.com/windows-11-highly-compressed/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601623801799981" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1228 chrome.exe 1228 chrome.exe 4204 chrome.exe 4204 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe Token: SeShutdownPrivilege 1228 chrome.exe Token: SeCreatePagefilePrivilege 1228 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe 1228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1228 wrote to memory of 4596 1228 chrome.exe 77 PID 1228 wrote to memory of 4596 1228 chrome.exe 77 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 4372 1228 chrome.exe 78 PID 1228 wrote to memory of 5012 1228 chrome.exe 79 PID 1228 wrote to memory of 5012 1228 chrome.exe 79 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80 PID 1228 wrote to memory of 1108 1228 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.ultracompressed.com/windows-11-highly-compressed/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe297cab58,0x7ffe297cab68,0x7ffe297cab782⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:22⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:82⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2156 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:82⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3996 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:82⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1428 --field-trial-handle=1812,i,10775080173759570340,14235879509549743227,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD5b5a53b15d693f309cd0ecc8ac3e63732
SHA16bd51aabe0c7c9d00c7d92753795661d96b290fe
SHA2568d4ef67e221229e55ab36fa6f716378252bff18e1dc097560f31e0eda68ed007
SHA512e7e4bcee4c84bf113dbd5d6b2d2374651b3f9f486446cc72f9886f29257664097df4f19e5874cbc832eb4c21b7bc2fca0be3149b79b90707400e873298803151
-
Filesize
3KB
MD5c4f5c125b8be706f1948bfafc83d0fa2
SHA1aa62fd5cddac83cf84762beba354c1192bf07fc0
SHA25624436028ba8b913533bd4c0b7d76b989a182f34aad2052d70bfcf690ffea43f1
SHA5126dad9d5aa4b0960e882a620f640ddb7815f3622210bbafceb57e475088c5d057ba39dbb1fdc0172f756682983566f5bae6b13498cd2719b696166d3cb00aa712
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5e37210fcf38e600f55e09667c744aa92
SHA1d9aed98c3106522bd1fa727887598bcf7c0a6bff
SHA2565dfcf875a1d09e946f3e6f3cf37f20f1384e352401d60e42d6b8f24aa6aeb66b
SHA512f190f4459e73ed277b2c45785a6a967fd194f47bdeaa789c00f834823659c5ff3936021081baef7c91b3060ad8e42f29e67e935b07fd8552feba191a6ba1dda7
-
Filesize
7KB
MD50c22b8a683d5a138133e581deb2c02f1
SHA1a62def90d6c6114b59cb4bc1b019c691a0dd9d48
SHA2566d42c213e19b2d0fe2a90d8fa56f37fd71fb820079c0d152c8242e5becbfbee1
SHA5123b6cc2ba1ce452da7a3c22c0a4ffb1770a69ad377a8e2efce9b3bd825c0005b490a8a63adf50cd85d659c08ec11096b0e4911e3ec3e64802557171fd82df828b
-
Filesize
7KB
MD5f993fab54cee7f00eae420d6720c1b02
SHA1c2719e2132650778ee8e572140011fa13e26fcbc
SHA25657d3022863f8be31e9a3f10e41a2c3713f15c624add2e461ed7131bc42f0acf0
SHA5126a29ad5a0a6a6b89f6ef33dedef1cb7206060c91067a2932476e05b7af973972ba067729d15557c1028e35eac1f98e60c9df0561ba5a93f7f4b92b37c7b16943
-
Filesize
7KB
MD5a4c7ee5c5af91080c43ad65898004955
SHA17b12cad2d48b2de9535c577aac764689566423e7
SHA256a1ad0aa65a9da98800aa94613625ee318be06a2e68abf8d7ce2a24287253d227
SHA512cbe5830fae63423e9a02a4dc4f84e8659a91c77f2bf95a0eef29d81fbfe29dfa28da90f273e6160a316f3c8017d43c30550eee19a0e1b20825fde98178b2fb0c
-
Filesize
130KB
MD5af4dc8d0c383fa3f9773bc06c967c1fd
SHA17e2e2e8cec77d43c6c551e15107a3bf3fbf091c4
SHA256d2a7ab1e4c86ed2a29a92f56d33709e86d489561e86213e885e5f4d460417918
SHA51293babf1c593d8c87c2e0a09621559189b8bd905f82b561b51a3bd75dff3c9f3304548cba3597ee56fbe1ff9087d8b8f8931a111c1facb4be1892ee63a32e9964