Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 13:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dnswl.org/
Resource
win10v2004-20240508-en
General
-
Target
https://www.dnswl.org/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602537190359029" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 3748 chrome.exe 3748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1672 chrome.exe 1672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe Token: SeShutdownPrivilege 1672 chrome.exe Token: SeCreatePagefilePrivilege 1672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe 1672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2536 1672 chrome.exe 81 PID 1672 wrote to memory of 2536 1672 chrome.exe 81 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 4744 1672 chrome.exe 83 PID 1672 wrote to memory of 2576 1672 chrome.exe 84 PID 1672 wrote to memory of 2576 1672 chrome.exe 84 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85 PID 1672 wrote to memory of 1284 1672 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dnswl.org/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0872ab58,0x7fff0872ab68,0x7fff0872ab782⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:22⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:82⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:12⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:82⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3916 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:82⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4468 --field-trial-handle=1844,i,9511861105161105058,12234706879810331593,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5814024506175e233e206b50b9fa99d53
SHA17972041d728c685fed490d652d02bf4c15d1abf8
SHA256670c2e82041b608486f1d4796e93b7866430be3cc7279fd3b3bc45567b65ccce
SHA512c41ec61f129d1f7a5dd9a2d6324d9029541358f875304f36eab4cdc5ca5e28748ded20fdf5bf7d55106b24f4c943f017935e76c9dd7719d84b4139a323255a2f
-
Filesize
2KB
MD54e655828ec29718b176e442c965911cb
SHA1cf3062761015a1eabec383562b5b0bd96b418e97
SHA2561333728fb36151a4480b1871f445a72dc624abe0fcc91b8c69d6497258460180
SHA512cbaf330bb6df001d447c0ccffa572425c1930595946de3e3f88a92d99f1e38e33b56f79512a26f8b5b1b6d3964c0be58174c322260238645111c72c80f8cf4b2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5f972b4a9d85327a97bd89a56eebba6db
SHA1c9be09bd8b3c7d3890f6eb7d77fd8103ff33533e
SHA2569c290e383371060e99b2c198dcca4f81db3970958efa17245a402498252009d4
SHA51235e24731e566ee9d2e120af514246af95ca94ac7cbec348a1540b1af3bd16b84e5cda16febf6ed9e94d2a321172f9d3030ab80cacddffd7d98f65ab39d554e09
-
Filesize
7KB
MD573fa7d70ca9dbec8e2e7ae36175839f6
SHA14fdc4da3503619b030880cad9f650b93cf64f22d
SHA2565859632611c22ec81528f057a7b759e2858d316bfdc8abc52e6c2fe441801d16
SHA512813dfca69c99c441590e3fb62a704369a088864c7ac22e2126e0749574e66585d8b50646a28802d6b33e4ab15e48c0a3c735b348c62b7e0e8a692a9e3d4f004f
-
Filesize
257KB
MD565128633f61fced24001d39aea3b301d
SHA14de03627ea5ad23f3970622b80199a7ff998d9d2
SHA256fc09c16a9a6213e6de786a45f35175ad4b7f93acfcac59d3543c3867cbc2a495
SHA5120a963eb76394f8aff5a37105bbb1fc4cee46b2856f1b926cf0432a1a0108e05e8c40b7410b6d05890497d217e95288e38f687a8b6c0fc5d6696b3ecdc9e600a7
-
Filesize
257KB
MD5dbc0848db6518724661494ad552c64a8
SHA18fc7a21a16f3cc5a15e6231908042862beef2b4f
SHA256eecc403b8794ee75f18390f1e147e8c9c850be1a3c41c028955520d72d56656d
SHA512d5acf37cd464aaa7ef8ce0b89c3399560d35e0c92fb9152af64b338dbefc412dffc774e31c2139f2bab9e3ef274e0e54dfe9f8c982378ee86c034883c0b53ccb
-
Filesize
257KB
MD5485ef5a1ecfaac820be9834c517915e3
SHA134d0291cb34ecfa993b57580fa6ebd88250475aa
SHA256f997c8e2c159c6f174cefa359af4bfbbdc3e2c24c75380b501ff1c856d7cfd06
SHA512c2aab3088b11e8abfd144b651003689d040f04707b71f3c8f607397d7d6e5d9c94eb9a783f86adf34c456886725e3e6b70d2b44a2221fabbab8029dbf484c3dc
-
Filesize
277KB
MD5798a8387854d81ed509ac389eb606b2f
SHA1ca97cc234dd76eabf541915e5d955e21b07c8186
SHA256668fce31afc44f3a8ab395651c552cba2badfd6a3ac2fd4bb54c6a0e37a1f530
SHA5122fc6fd73a19caa37a95e03aadd391717c9249cd5e308b77b6211ca963624510e5961e61db5c6c063ffeda1845a78b92af7afca52a0d32ec93bcaf8c72e9412dd
-
Filesize
91KB
MD5228deee8e4d526bc278e657428be5884
SHA11675d3246f5ce465b8d70b6389e6ab7079f0f810
SHA256008448d8e6ddba965690145f7112cfd9df42db933e2544ea628e8a5349f022e0
SHA5124c8e081e3366782f3580efb3a845be87375193c750fcd153c9ee4f7bf3219442d9e44d21e6b469fd94abce160fed6d290fa67cd33b1dbeab24d9bde5165ec509
-
Filesize
88KB
MD5c33e2f3aa92b0cf1c0fb747e0587ec4e
SHA1344ca6ff0c73e40a4f4eb29b3bd6a3f9426835b1
SHA2567330471c0970e5410d67e9693b1af4ace8d5253a1b7d15cd371694d93b81ed56
SHA512e4828f01c9eb25f82a4dd46748caef5d53dd3ee30db7fbf2fb2284aaea3957777289b2fbb642fd0429e0821aa376d6c73724aade1476d935502ab5b0d77043e6