Analysis
-
max time kernel
18s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ci4.googleusercontent.com/proxy/vFqCyStth84Hu86lq6k--IedlPXegd9djEvgzi-Dwb7ANTE7RtmSeInwgH45gHL3UzsC2GX6Dz8yJXf11fq2JpArY1SDScWs1Y1mPJtSpJ46hzYN1ieeOYMRH78GgH6WDof3qRYmD3oedpiOQTXbf0PdCbwSrvzLSUJrmbYnD186xSjlF1Kdr3GdsEFsAwbWoJKVvAiuNQdRXTZ9vH5tBe_eHu5WJGaN6Skb40YG6CILpJc=s0-d-e1-ft#https://hs-21113418.f.hubspotemail.net/hs/hsstatic/TemplateAssets/static-1.262/img/hs_default_template_images/modules/Follow+Me+-+Email/tiktok_square_black.png
Resource
win10v2004-20240426-en
General
-
Target
https://ci4.googleusercontent.com/proxy/vFqCyStth84Hu86lq6k--IedlPXegd9djEvgzi-Dwb7ANTE7RtmSeInwgH45gHL3UzsC2GX6Dz8yJXf11fq2JpArY1SDScWs1Y1mPJtSpJ46hzYN1ieeOYMRH78GgH6WDof3qRYmD3oedpiOQTXbf0PdCbwSrvzLSUJrmbYnD186xSjlF1Kdr3GdsEFsAwbWoJKVvAiuNQdRXTZ9vH5tBe_eHu5WJGaN6Skb40YG6CILpJc=s0-d-e1-ft#https://hs-21113418.f.hubspotemail.net/hs/hsstatic/TemplateAssets/static-1.262/img/hs_default_template_images/modules/Follow+Me+-+Email/tiktok_square_black.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608881948728418" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3520 chrome.exe 3520 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe Token: SeShutdownPrivilege 3520 chrome.exe Token: SeCreatePagefilePrivilege 3520 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
Processes:
chrome.exepid process 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe 3520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3520 wrote to memory of 1324 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 1324 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2064 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 3768 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 3768 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe PID 3520 wrote to memory of 2020 3520 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ci4.googleusercontent.com/proxy/vFqCyStth84Hu86lq6k--IedlPXegd9djEvgzi-Dwb7ANTE7RtmSeInwgH45gHL3UzsC2GX6Dz8yJXf11fq2JpArY1SDScWs1Y1mPJtSpJ46hzYN1ieeOYMRH78GgH6WDof3qRYmD3oedpiOQTXbf0PdCbwSrvzLSUJrmbYnD186xSjlF1Kdr3GdsEFsAwbWoJKVvAiuNQdRXTZ9vH5tBe_eHu5WJGaN6Skb40YG6CILpJc=s0-d-e1-ft#https://hs-21113418.f.hubspotemail.net/hs/hsstatic/TemplateAssets/static-1.262/img/hs_default_template_images/modules/Follow+Me+-+Email/tiktok_square_black.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d5fab58,0x7ffe4d5fab68,0x7ffe4d5fab782⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:22⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:82⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:12⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:12⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:82⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4936 --field-trial-handle=1588,i,18308943201189600688,13421560016255277117,131072 /prefetch:12⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2444
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD55607cd58a18b13aebad8abccdd1ed3ea
SHA1a3185c08a44e73c0f1875bf8521c24034b02be9d
SHA2561c324bdbcd50594a298d6f5e62d39ab2f91eada9725ec7a7d20de31ae9644580
SHA5120916dd565c9dfc21f265647180ee881897c8d52c76f23e3cff57f444ef93f7b838fb68deab251362ddef1481c36cc973f787705476307d3b52479a111762b0c1
-
Filesize
130KB
MD5c0399fae108500a32f93c443c8ac6cc2
SHA1e4318e9bb00d4423a42ef6e0faa4f90669d79ccd
SHA2562be38c22ca0f464ee32076d23d934fa3f5dc6f40e076845fc5a503368139eaa6
SHA5125e2383bf61b86f429d7b195c7ce8427d1ec138165ea0e03f9bb6683919a6a9a86eef929eb1d98c2054b887fab07db5c688ff7effc4b7353579d4fc330cbbfecc