Analysis
-
max time kernel
24s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwjhwLWm8J6GAxV3XP8BHWFLCrUYABAAGgJtZA&ase=2&gclid=EAIaIQobChMI4cC1pvCehgMVd1z_AR1hSwq1EAAYASAAEgIkvPD_BwE&ohost=www.google.com&cid=CAASJeRoSPDhPD0Bq3LzFYZ8t073EfaBYyrItX21g7XMp2F_1GgTx5Q&sig=AOD64_2U7Qt3y7mCo5up0QM9maLymMI1iA&q&nis=6&adurl&ved=2ahUKEwjq7a6m8J6GAxUtkYkEHadoAGMQ0Qx6BAgJEAE
Resource
win10v2004-20240508-en
General
-
Target
https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwjhwLWm8J6GAxV3XP8BHWFLCrUYABAAGgJtZA&ase=2&gclid=EAIaIQobChMI4cC1pvCehgMVd1z_AR1hSwq1EAAYASAAEgIkvPD_BwE&ohost=www.google.com&cid=CAASJeRoSPDhPD0Bq3LzFYZ8t073EfaBYyrItX21g7XMp2F_1GgTx5Q&sig=AOD64_2U7Qt3y7mCo5up0QM9maLymMI1iA&q&nis=6&adurl&ved=2ahUKEwjq7a6m8J6GAxUtkYkEHadoAGMQ0Qx6BAgJEAE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607766845010411" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 936 chrome.exe 936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe Token: SeShutdownPrivilege 936 chrome.exe Token: SeCreatePagefilePrivilege 936 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe 936 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 936 wrote to memory of 1584 936 chrome.exe chrome.exe PID 936 wrote to memory of 1584 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2664 936 chrome.exe chrome.exe PID 936 wrote to memory of 2560 936 chrome.exe chrome.exe PID 936 wrote to memory of 2560 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe PID 936 wrote to memory of 4916 936 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwjhwLWm8J6GAxV3XP8BHWFLCrUYABAAGgJtZA&ase=2&gclid=EAIaIQobChMI4cC1pvCehgMVd1z_AR1hSwq1EAAYASAAEgIkvPD_BwE&ohost=www.google.com&cid=CAASJeRoSPDhPD0Bq3LzFYZ8t073EfaBYyrItX21g7XMp2F_1GgTx5Q&sig=AOD64_2U7Qt3y7mCo5up0QM9maLymMI1iA&q&nis=6&adurl&ved=2ahUKEwjq7a6m8J6GAxUtkYkEHadoAGMQ0Qx6BAgJEAE1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfb52ab58,0x7ffdfb52ab68,0x7ffdfb52ab782⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:22⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1736 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:82⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2180 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2988 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:12⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4392 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1760,i,317979687506104969,4856084962104455974,131072 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5bebc9572abe125ed9706180f7d506294
SHA1cf390e36c0ea52501cf327dd2b71d41ce3e19fa5
SHA256454351d21c7b23dddfef0f77854932c272f4a3d754ea5d2a61a5e52b22d64261
SHA5125479c55a7b15512e140ce53ab05e6c3b603714c45ce6f61de612a61f54267aad0b3227438200a7b39d418641b53dbcf5ccf05cd7fbbe87eaa1b6120cae3dd036
-
Filesize
2KB
MD58f2f7ffbff1f623cacd297b642713af9
SHA142c41cc22edbad927cf4643194184fda5bd7fd95
SHA2565bfe14e3698c729269386f575d2f5e447a7bf1b4c06db76341e44f843a0d657a
SHA512fe18cbc35436d1d1037c6093f89c0a9028c245d80d8fca0e4d0131600c5feb6f6eb1550f330068ec3099977009bf394d9921692ebabf8dd793856538b865c325
-
Filesize
7KB
MD54a6b77b8742a382267cb98d0a54ce7b8
SHA1c4c9bbf5651ba82aa8ad34161d9aeb0d47700d01
SHA2563e22dc8a7478042d4db8082f88d99644f7e291d648ad78164c5cc9895114c3f1
SHA512f10edb1c1d148c3425e49947b43d5db28770fb88bb6dd04666e47b1a5e2fae080429c15c030926fed0aba7ca6bc8f8c1de11e0ad44ab0da1d7d3f8df94b37d55
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD50b3068d5b74085ef6b523be9bff5f1f8
SHA1c2140900724cd602b340c19177710de01efe4191
SHA256b9d3aeb2181b1ca04c7e5ebbf62fcc8e214ae1b2375e47b62cae5d78fe61c5ea
SHA51293fe8a1153d0d77edd183e75b0d5e134c0ea20855f69e351bb3eaf83245e927f6b1868ae0c07523e78faee50a604cb1d5b5b7ff4defb5a6ea925c685f8ede32a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57aaa7.TMP
Filesize48B
MD553e23fea7dcd88d616dcd909178fe29b
SHA1c1c942fc977ab788c784aecce6cea8a5ce7a8584
SHA256a3bed6539f43805e77302756b49ed5709380acaf78c9723137e44c897e7ce995
SHA512b08e59cad918cd2bf6810186a2e5c3325152632663fe6a1034ef1ccf5751fc1a4b3202f8d404c9e0ce030d5a918ed386e6d9405182debf8ad4c943b67ca35f07
-
Filesize
129KB
MD5ff6631eaca2c98818febd6d771469766
SHA1d1f2faf90682c6763b6214a929dd892e75a46131
SHA25649bc56f5bb5813b12836bad4aef412606870ca4e6a75bae0a555783af0b71f60
SHA51222784e8f6eb900cac493c2367447c040f25125b4facb070e32fe4964784bf701b4dd78ae213ab848bd3cf3690a894268786b82264325e68f99b4281038baf9e1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e