Analysis
-
max time kernel
1799s -
max time network
1686s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-05-2024 22:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://psnresolver.org/
Resource
win11-20240426-en
General
-
Target
https://psnresolver.org/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133606368484233114" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 5028 chrome.exe 5028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 5012 4748 chrome.exe 80 PID 4748 wrote to memory of 5012 4748 chrome.exe 80 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 4040 4748 chrome.exe 81 PID 4748 wrote to memory of 3768 4748 chrome.exe 82 PID 4748 wrote to memory of 3768 4748 chrome.exe 82 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83 PID 4748 wrote to memory of 536 4748 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://psnresolver.org/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe3045ab58,0x7ffe3045ab68,0x7ffe3045ab782⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:22⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2164 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4156 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:12⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 --field-trial-handle=1824,i,5381676758175534849,9617822454842065553,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528B
MD5cca42cc5dcff5e61b5947f097d702047
SHA104e094f4f15e7541f3b4f144057251ac62be9f46
SHA256019f3d9ee35d4e569a03ba2e68de67bd2156fa51db319f013bd5505842dc593c
SHA512e389067c33b84134f5fb3f21524246f686b22c2f98c700a384f584e17641b2c0ca01381203e437f026d1919083d47fe83c5bbdc3d8d65ffa6a838720d8a501f8
-
Filesize
3KB
MD5e34b9370a65c8adacbb89e7dd8e743f7
SHA16854a7b7917496b0b8de688a10d752b09b4ff557
SHA256b24738f8b440cd219b9a603d890ce3d839ac2169b2e8839314c560f52c79ecab
SHA5126da22a454344d56a39e826b166b9b937bcf5dbb8d9ce5cf52a3f5e6621dc6f34af82774a3e5574ca01ba1d781eb8e4e700d8b528cbe67563411e5ec415c5a572
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD55a69252fa779e91d2ce43ee4d7327f62
SHA1cdc8af8890ab638c88f69509c2e25e84603298b5
SHA25698cc31a2b5c10f1a61a545313381748308d3d26bcdd26320a782c0b5d0def62d
SHA5122c837ceb9988f55405df75c64fe4cf7ad55dfb1e6f5140adeb86ce8f1e236be2a044f9e89cbef16a999bf9bea49c012c2d81e4631dca3bacfa002e8fb028338f
-
Filesize
7KB
MD55c0ad20e75d9efc80b9af12c7ec63957
SHA1c22c94ac581adef318bf06f4e11cbe64cf6673a6
SHA25643d03ae2d84493b64879d4c65f0bc9c835f50ad86e6242fec527f130dbef9c58
SHA512e3c09c7b1d9e22a75cd797a535406cd2004fbda8dca21ab4b31dea646f5e6b3b6fd809274bc44daea89a3014ae919e71b3d48470e84db659bc34dad78c2e6792
-
Filesize
256KB
MD5a54ca52c79f2b17432303ac1a55d68da
SHA17cf4791b7bc7f06e08f1a35cc18548444f03cf5e
SHA256831754994e238d853c71bff8dd8f3daaa6e0d33a513fb7f1e44386406f97670b
SHA512530a271b9a8f85396cd3b897f94ac84f55c307bb8eed5e7add1ef56441273e1e8c2eaf40397cba353513f43138776b2209040755d2845ba133d201617a5df4a2