Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 05:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://flow.page/myyg00vv
Resource
win10v2004-20240426-en
General
-
Target
https://flow.page/myyg00vv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603095519148507" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 1872 chrome.exe 1872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe Token: SeShutdownPrivilege 4948 chrome.exe Token: SeCreatePagefilePrivilege 4948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe 4948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2728 4948 chrome.exe 83 PID 4948 wrote to memory of 2728 4948 chrome.exe 83 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 4740 4948 chrome.exe 84 PID 4948 wrote to memory of 512 4948 chrome.exe 85 PID 4948 wrote to memory of 512 4948 chrome.exe 85 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86 PID 4948 wrote to memory of 1780 4948 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://flow.page/myyg00vv1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9d0bab58,0x7ffd9d0bab68,0x7ffd9d0bab782⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:22⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1864 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:82⤵PID:512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:82⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3092 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:12⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4060 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:82⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4728 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4668 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:12⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3236 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:12⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4644 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3112 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:12⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1548 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2760 --field-trial-handle=2060,i,8675159645786613607,11864680670573722153,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b212a798db3b717b02ca67e3ca5c0bef
SHA18f664bbee4804fedcc4293b697aa191b1f9a166e
SHA256f6789b1579e3915acc50ce2f56d956c05dc3186238eb4d1a0d4ad1e403a625ac
SHA5128c3e14a372bbbd1eb59ec1b0e82249cbebb6db1d9e75f6aff2e51dbd1bdefc44aef96cc98259c7a33a762465fc8b409baadac993f1c69c60013f7c75a5ce488a
-
Filesize
984B
MD5cfcb369e8451bd6f3fb8e78408bccbe4
SHA12aed89d1f6c321478ab8c18341d969cec044f8c9
SHA256e730be9a4d2c7d54728b79ebd3407c17a259de3140cf438bec62202b482d938b
SHA512f9d96fd64281d9f58393abc9c5466e0794640fd0c20400a718f86d6b29bfc65f3b42fe60ea0ae783b3a7242d923cedbfafc6a03775d265378e64fae4238d4605
-
Filesize
1KB
MD5bb930338d3ccdccd3c638803417888d5
SHA14c2145219a9bf7dbe23e11ff2fcf524af5c2bf41
SHA2567d61eb60cb630d34faa51af2887c19a383495d358b470f8965f77e9e05dea18b
SHA512a8844a8ef2694875a30d3ed46e755b328115c2016cc1aaf042c3e056806edf1d651dc88cc805a502454303e9c06fa399de36bf6de6e33e5fa9f46f19c0aeb5ff
-
Filesize
2KB
MD53244adcae88f8f1395388b7ebc309122
SHA1be43ecb4cac024e9e41d8c8dcb7766af4ccf3a1f
SHA2566a787a4549af8bd294410517ad22be238758f26afc5d4203a44df989734c46ba
SHA512a2f050f2a4f13c83949f6b2d19496b02592588857ea13d26309533ebbd4d5d0da3c2658e075efa5713e36f10a241c41fc371045aa72cbe92e828aeb15fcd7435
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD511d508d2a9c54b06f4a6afa018d89243
SHA1a66dca65eeed0d1b441d874996d4149a156039b5
SHA256b16a48037b97f8fc762a75df1b53104cbe8d53854ccf9f593589f0a64ad6e319
SHA51223ca608c1095e20b10c5bbec180150193b4a9721c874a26214c0f20441acf0cf03397095b92cd26f1a5d02d5ca140bf43ff83f49f85d3624f40ba32023f58fb4
-
Filesize
7KB
MD5fefa3aa95ae7698791bfed71c330feec
SHA1640ccd009b2cb94f2d24eb70cde52e177270feb7
SHA256ae0d53b022790181446bdfcd6fef23831c2d9387b84f41c9c96f26be1fd6687b
SHA5125a1432ad6c53ac2f1d62042ade762dc7dcbb28c92b7c7545b855f9c744992e87fa56fbc56bde42950f17fb15b07fed78906a6002d3a3d764acf2dbc016a0c8dd
-
Filesize
130KB
MD5b7d1b818cb53c6ee4d6e42f4240fb70a
SHA111742793c6938ce8ef86c9e463b1f58cd0433fdd
SHA256b2c90b19422775b03235db8954a63eec2be956916892aabf2856a02315ced387
SHA512c823fb0a9fa19a7076e9a1a9d65b671064060af58273110f47d0489e9d2499840521c12ac0da04d2b31ca7b0ea6b7315575f4dcec6c5802ae14a87e1a43b9169